Multilevel classification of security threats in cloud computing
Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issu...
Published in: | International Journal of Engineering & Technology |
---|---|
Main Authors: | , , , |
Format: | Article in Journal/Newspaper |
Language: | English |
Published: |
Science Publishing Corporation
2017
|
Subjects: | |
Online Access: | https://www.sciencepubco.com/index.php/ijet/article/view/9157 https://doi.org/10.14419/ijet.v7i1.5.9157 |
id |
ftsciencepubcorp:oai:ojs.pkp.sfu.ca:article/9157 |
---|---|
record_format |
openpolar |
spelling |
ftsciencepubcorp:oai:ojs.pkp.sfu.ca:article/9157 2023-05-15T18:32:42+02:00 Multilevel classification of security threats in cloud computing Srinivasu, N. Sree Priyanka, O. Prudhvi, M. Meghana, G. 2017-12-31 application/pdf https://www.sciencepubco.com/index.php/ijet/article/view/9157 https://doi.org/10.14419/ijet.v7i1.5.9157 eng eng Science Publishing Corporation https://www.sciencepubco.com/index.php/ijet/article/view/9157/3145 https://www.sciencepubco.com/index.php/ijet/article/view/9157 doi:10.14419/ijet.v7i1.5.9157 Copyright (c) 2018 International Journal of Engineering & Technology International Journal of Engineering & Technology; Vol 7, No 1.5 (2018): Special Issue 5; 253-257 2227-524X 10.14419/ijet.v7i1.5 Saas Paas Iaas data backup encryption DSC SLA Virtualization data transmission info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion 2017 ftsciencepubcorp https://doi.org/10.14419/ijet.v7i1.5.9157 https://doi.org/10.14419/ijet.v7i1.5 2022-03-22T07:24:35Z Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6. Article in Journal/Newspaper The Pointers Science Publishing Corporation (SPC): E-Journals International Journal of Engineering & Technology 7 1.5 253 |
institution |
Open Polar |
collection |
Science Publishing Corporation (SPC): E-Journals |
op_collection_id |
ftsciencepubcorp |
language |
English |
topic |
Saas Paas Iaas data backup encryption DSC SLA Virtualization data transmission |
spellingShingle |
Saas Paas Iaas data backup encryption DSC SLA Virtualization data transmission Srinivasu, N. Sree Priyanka, O. Prudhvi, M. Meghana, G. Multilevel classification of security threats in cloud computing |
topic_facet |
Saas Paas Iaas data backup encryption DSC SLA Virtualization data transmission |
description |
Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6. |
format |
Article in Journal/Newspaper |
author |
Srinivasu, N. Sree Priyanka, O. Prudhvi, M. Meghana, G. |
author_facet |
Srinivasu, N. Sree Priyanka, O. Prudhvi, M. Meghana, G. |
author_sort |
Srinivasu, N. |
title |
Multilevel classification of security threats in cloud computing |
title_short |
Multilevel classification of security threats in cloud computing |
title_full |
Multilevel classification of security threats in cloud computing |
title_fullStr |
Multilevel classification of security threats in cloud computing |
title_full_unstemmed |
Multilevel classification of security threats in cloud computing |
title_sort |
multilevel classification of security threats in cloud computing |
publisher |
Science Publishing Corporation |
publishDate |
2017 |
url |
https://www.sciencepubco.com/index.php/ijet/article/view/9157 https://doi.org/10.14419/ijet.v7i1.5.9157 |
genre |
The Pointers |
genre_facet |
The Pointers |
op_source |
International Journal of Engineering & Technology; Vol 7, No 1.5 (2018): Special Issue 5; 253-257 2227-524X 10.14419/ijet.v7i1.5 |
op_relation |
https://www.sciencepubco.com/index.php/ijet/article/view/9157/3145 https://www.sciencepubco.com/index.php/ijet/article/view/9157 doi:10.14419/ijet.v7i1.5.9157 |
op_rights |
Copyright (c) 2018 International Journal of Engineering & Technology |
op_doi |
https://doi.org/10.14419/ijet.v7i1.5.9157 https://doi.org/10.14419/ijet.v7i1.5 |
container_title |
International Journal of Engineering & Technology |
container_volume |
7 |
container_issue |
1.5 |
container_start_page |
253 |
_version_ |
1766216890572603392 |