earticle

논문검색

Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Computing

초록

영어

Cloud computing has attracted users due to high speed and bandwidth of the internet. The e-commerce systems are best utilizing the cloud computing. The cloud can be accessed by a password and username and is completely dependent upon the internet. The threats to confidentiality, integrity, authentication and other vulnerabilities that are associated with the internet are also associated with cloud. The internet and cloud can be secured from threats by ensuring proper security and authorization. The channel between user and cloud server must be secured with a proper authorization mechanism. The research has been carried out and different models have been proposed by the authors to ensure the security of clouds. In this paper, we have critically analyzed the already published literature on the security and authorization of the internet and cloud.

목차

Abstract
 1. Introduction
 2. Literature Review
 3. Critical Analysis
 4. Conclusion and Future Work
 References

저자정보

  • Masood Shah SZABIST, Islamabad, Pakistan
  • Abdul Salam Shah SZABIST, Islamabad, Pakistan

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.