SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS

Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features p...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced research in computer science 2017-11, Vol.8 (9), p.405-410
1. Verfasser: Oberoi, Priya
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 410
container_issue 9
container_start_page 405
container_title International journal of advanced research in computer science
container_volume 8
creator Oberoi, Priya
description Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular).
doi_str_mv 10.26483/ijarcs.v8i9.5045
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1980477447</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1980477447</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1187-4084312d4e2b4f4495757e8019d57af312f71a889e70bc30137c018b82a43c473</originalsourceid><addsrcrecordid>eNpNkNFKwzAUhoMoOOYewLuA151Jc9okV1K7Tou1haYt7Cq0XQsdamfiBN_ebvPC_-b8cD7OgQ-hW0qWrg-C3Q-72rR2-S0GufQIeBdoRiT3Hc-X_PJfv0YLa3dkCpPSBzJDD6rMq2iDszWugjzOSoVVFJZ5XGxwUBRB-KJwnOIwycqVwo-BilY4Sqs4z9LXKC3UDbrq6zfbLf7mHJXrqAifnSR7isMgcVpKBXeACGDU3ULnNtADSI97vBOEyq3H635a9ZzWQsiOk6ZlhDLeEioa4dbAWuBsju7Od_dm_Dx09kvvxoP5mF5qKgUBzuFE0TPVmtFa0_V6b4b32vxoSvRJlT6r0kdV-qiK_QKFWFZy</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1980477447</pqid></control><display><type>article</type><title>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Oberoi, Priya</creator><creatorcontrib>Oberoi, Priya ; M.M. Institute of Computer Technology &amp; Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</creatorcontrib><description>Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular).</description><identifier>ISSN: 0976-5697</identifier><identifier>EISSN: 0976-5697</identifier><identifier>DOI: 10.26483/ijarcs.v8i9.5045</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Access control ; Cloud computing ; Computer science ; Confidentiality ; Cybersecurity ; Data integrity ; New technology ; Security management ; Threats ; Trends</subject><ispartof>International journal of advanced research in computer science, 2017-11, Vol.8 (9), p.405-410</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science Nov 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1187-4084312d4e2b4f4495757e8019d57af312f71a889e70bc30137c018b82a43c473</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Oberoi, Priya</creatorcontrib><creatorcontrib>M.M. Institute of Computer Technology &amp; Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</creatorcontrib><title>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</title><title>International journal of advanced research in computer science</title><description>Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular).</description><subject>Access control</subject><subject>Cloud computing</subject><subject>Computer science</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>New technology</subject><subject>Security management</subject><subject>Threats</subject><subject>Trends</subject><issn>0976-5697</issn><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpNkNFKwzAUhoMoOOYewLuA151Jc9okV1K7Tou1haYt7Cq0XQsdamfiBN_ebvPC_-b8cD7OgQ-hW0qWrg-C3Q-72rR2-S0GufQIeBdoRiT3Hc-X_PJfv0YLa3dkCpPSBzJDD6rMq2iDszWugjzOSoVVFJZ5XGxwUBRB-KJwnOIwycqVwo-BilY4Sqs4z9LXKC3UDbrq6zfbLf7mHJXrqAifnSR7isMgcVpKBXeACGDU3ULnNtADSI97vBOEyq3H635a9ZzWQsiOk6ZlhDLeEioa4dbAWuBsju7Od_dm_Dx09kvvxoP5mF5qKgUBzuFE0TPVmtFa0_V6b4b32vxoSvRJlT6r0kdV-qiK_QKFWFZy</recordid><startdate>20171101</startdate><enddate>20171101</enddate><creator>Oberoi, Priya</creator><general>International Journal of Advanced Research in Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20171101</creationdate><title>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</title><author>Oberoi, Priya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1187-4084312d4e2b4f4495757e8019d57af312f71a889e70bc30137c018b82a43c473</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Access control</topic><topic>Cloud computing</topic><topic>Computer science</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>New technology</topic><topic>Security management</topic><topic>Threats</topic><topic>Trends</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Oberoi, Priya</creatorcontrib><creatorcontrib>M.M. Institute of Computer Technology &amp; Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Oberoi, Priya</au><aucorp>M.M. Institute of Computer Technology &amp; Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2017-11-01</date><risdate>2017</risdate><volume>8</volume><issue>9</issue><spage>405</spage><epage>410</epage><pages>405-410</pages><issn>0976-5697</issn><eissn>0976-5697</eissn><abstract>Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular).</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><doi>10.26483/ijarcs.v8i9.5045</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0976-5697
ispartof International journal of advanced research in computer science, 2017-11, Vol.8 (9), p.405-410
issn 0976-5697
0976-5697
language eng
recordid cdi_proquest_journals_1980477447
source EZB-FREE-00999 freely available EZB journals
subjects Access control
Cloud computing
Computer science
Confidentiality
Cybersecurity
Data integrity
New technology
Security management
Threats
Trends
title SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T01%3A05%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=SURVEY%20OF%20VARIOUS%20SECURITY%20ATTACKS%20IN%20CLOUDS%20BASED%20ENVIRONMENTS&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Oberoi,%20Priya&rft.aucorp=M.M.%20Institute%20of%20Computer%20Technology%20&%20Business%20Management,%20Maharishi%20Markandeshwar%20University,%20Mullana,%20Ambala,%20Haryana,%20India&rft.date=2017-11-01&rft.volume=8&rft.issue=9&rft.spage=405&rft.epage=410&rft.pages=405-410&rft.issn=0976-5697&rft.eissn=0976-5697&rft_id=info:doi/10.26483/ijarcs.v8i9.5045&rft_dat=%3Cproquest_cross%3E1980477447%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1980477447&rft_id=info:pmid/&rfr_iscdi=true