{"title":"Security Attacks in Cloud Computing: A Systematic Review","authors":"Suman Sansanwal, Nitin Jain","doi":"10.1109/ICIRCA51532.2021.9544840","DOIUrl":null,"url":null,"abstract":"These days cloud computing plays very major role in the world of computers. On demand services via Internet is provided by cloud computing using large amount of virtual storage. Its most important feature is that user has no need to establish costly computing infrastructure and pay very less for its services. Virtualization is the backbone of resource sharing provided by cloud computing. Security is huge challenge of cloud computing. Cloud computing allows the user to access resources anywhere anytime via internet which is actually the main reason behind the multiple varieties of attacks. Generally at different cloud layers various threats functioning like data breach, data leakage and unauthorized data access. Even there is constant implementation and improvement occurring regarding security issues and its countermeasures over cloud computing with the growth of time, unfortunately security is still a big challenge. This paper includes a examination based on a theoretical survey on cloud computing that communicated various possible threats and also taxonomy model where at each layer a number of various security attacks enter from the usage of different cloud services, moreover for these attacks proposed mechanisms and the solutions available earlier.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIRCA51532.2021.9544840","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
These days cloud computing plays very major role in the world of computers. On demand services via Internet is provided by cloud computing using large amount of virtual storage. Its most important feature is that user has no need to establish costly computing infrastructure and pay very less for its services. Virtualization is the backbone of resource sharing provided by cloud computing. Security is huge challenge of cloud computing. Cloud computing allows the user to access resources anywhere anytime via internet which is actually the main reason behind the multiple varieties of attacks. Generally at different cloud layers various threats functioning like data breach, data leakage and unauthorized data access. Even there is constant implementation and improvement occurring regarding security issues and its countermeasures over cloud computing with the growth of time, unfortunately security is still a big challenge. This paper includes a examination based on a theoretical survey on cloud computing that communicated various possible threats and also taxonomy model where at each layer a number of various security attacks enter from the usage of different cloud services, moreover for these attacks proposed mechanisms and the solutions available earlier.