{"title":"Detection of Attacks in Cloud Computing Environment– A Comprehensive Review","authors":"Pooja Rana, Isha Batra","doi":"10.1109/ICIEM51511.2021.9445284","DOIUrl":null,"url":null,"abstract":"Today cloud computing is becoming very popular as it provides computing services at low cost. But the major obstacle in the cloud computing implementation is the security issue. Despite various advantages of cloud computing, various organizations are not moving towards it. are Cloud computing is following the distributed technology and many vulnerabilities are introduced because of the features like multi-tenancy, resource-sharing. In this review paper various attacks and intrusion detection system in the cloud computing environment are discussed. Various existing intrusion detection systems for the cloud computing environment are explored and their limitations are also discussed. The future work is also discussed in this review paper.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEM51511.2021.9445284","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Today cloud computing is becoming very popular as it provides computing services at low cost. But the major obstacle in the cloud computing implementation is the security issue. Despite various advantages of cloud computing, various organizations are not moving towards it. are Cloud computing is following the distributed technology and many vulnerabilities are introduced because of the features like multi-tenancy, resource-sharing. In this review paper various attacks and intrusion detection system in the cloud computing environment are discussed. Various existing intrusion detection systems for the cloud computing environment are explored and their limitations are also discussed. The future work is also discussed in this review paper.