Multilevel classification of security threats in cloud computing

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issu...

Full description

Bibliographic Details
Published in:International Journal of Engineering & Technology
Main Authors: Srinivasu, N., Sree Priyanka, O., Prudhvi, M., Meghana, G.
Format: Article in Journal/Newspaper
Language:English
Published: Science Publishing Corporation 2017
Subjects:
DSC
SLA
Online Access:https://www.sciencepubco.com/index.php/ijet/article/view/9157
https://doi.org/10.14419/ijet.v7i1.5.9157
id ftsciencepubcorp:oai:ojs.pkp.sfu.ca:article/9157
record_format openpolar
spelling ftsciencepubcorp:oai:ojs.pkp.sfu.ca:article/9157 2023-05-15T18:32:42+02:00 Multilevel classification of security threats in cloud computing Srinivasu, N. Sree Priyanka, O. Prudhvi, M. Meghana, G. 2017-12-31 application/pdf https://www.sciencepubco.com/index.php/ijet/article/view/9157 https://doi.org/10.14419/ijet.v7i1.5.9157 eng eng Science Publishing Corporation https://www.sciencepubco.com/index.php/ijet/article/view/9157/3145 https://www.sciencepubco.com/index.php/ijet/article/view/9157 doi:10.14419/ijet.v7i1.5.9157 Copyright (c) 2018 International Journal of Engineering & Technology International Journal of Engineering & Technology; Vol 7, No 1.5 (2018): Special Issue 5; 253-257 2227-524X 10.14419/ijet.v7i1.5 Saas Paas Iaas data backup encryption DSC SLA Virtualization data transmission info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion 2017 ftsciencepubcorp https://doi.org/10.14419/ijet.v7i1.5.9157 https://doi.org/10.14419/ijet.v7i1.5 2022-03-22T07:24:35Z Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6. Article in Journal/Newspaper The Pointers Science Publishing Corporation (SPC): E-Journals International Journal of Engineering & Technology 7 1.5 253
institution Open Polar
collection Science Publishing Corporation (SPC): E-Journals
op_collection_id ftsciencepubcorp
language English
topic Saas
Paas
Iaas
data backup
encryption
DSC
SLA
Virtualization
data transmission
spellingShingle Saas
Paas
Iaas
data backup
encryption
DSC
SLA
Virtualization
data transmission
Srinivasu, N.
Sree Priyanka, O.
Prudhvi, M.
Meghana, G.
Multilevel classification of security threats in cloud computing
topic_facet Saas
Paas
Iaas
data backup
encryption
DSC
SLA
Virtualization
data transmission
description Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.
format Article in Journal/Newspaper
author Srinivasu, N.
Sree Priyanka, O.
Prudhvi, M.
Meghana, G.
author_facet Srinivasu, N.
Sree Priyanka, O.
Prudhvi, M.
Meghana, G.
author_sort Srinivasu, N.
title Multilevel classification of security threats in cloud computing
title_short Multilevel classification of security threats in cloud computing
title_full Multilevel classification of security threats in cloud computing
title_fullStr Multilevel classification of security threats in cloud computing
title_full_unstemmed Multilevel classification of security threats in cloud computing
title_sort multilevel classification of security threats in cloud computing
publisher Science Publishing Corporation
publishDate 2017
url https://www.sciencepubco.com/index.php/ijet/article/view/9157
https://doi.org/10.14419/ijet.v7i1.5.9157
genre The Pointers
genre_facet The Pointers
op_source International Journal of Engineering & Technology; Vol 7, No 1.5 (2018): Special Issue 5; 253-257
2227-524X
10.14419/ijet.v7i1.5
op_relation https://www.sciencepubco.com/index.php/ijet/article/view/9157/3145
https://www.sciencepubco.com/index.php/ijet/article/view/9157
doi:10.14419/ijet.v7i1.5.9157
op_rights Copyright (c) 2018 International Journal of Engineering & Technology
op_doi https://doi.org/10.14419/ijet.v7i1.5.9157
https://doi.org/10.14419/ijet.v7i1.5
container_title International Journal of Engineering & Technology
container_volume 7
container_issue 1.5
container_start_page 253
_version_ 1766216890572603392