Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

Analysis of Cloud Services Attacks and its Solution
Farhan Nisar, Samad Baseer
Department of Computer Science Department of Computer Science Qurtaba University, Pakistan, University of Engineering & Technology, Pakistan
Abstract: With the development of Cloud computing applications in recent years, Cloud Computing plays a very important role in all environments for data storage, roles and services in the Cloud Computing Architectures. This is the main advantage of Cloud Computing that data can be stored in remote servers and can be accessed by the Cloud Users distantly. However, the advantages completely contain the drawbacks of data security in Clouds because of security issues, and this paper provides the proper solution. This paper presents a detailed study of cloud security attacks in cloud services in IaaS, PaaS, and SaaS components, its security issues, and how they prevent attacks.
Keywords: Cloud, Cloud Computing, Cloud Services, Cloud Security, IaaS, PaaS, SaaS, Security Attacks And Their Solution Analysis of Cloud Services Attacks and its Solution
DOI:https://doi.org/10.6025/jisr/2024/15/1/1-10
Full_Text   PDF 1.32 MB   Download:   37  times
References:

[1] Harshita. (2013). A survey of different types of security threats and its countermeasures.

[2] Computerweekly.com.

[3] Ponemon Institute/Symantic.com.

[4] Ionanidis, J., Bellovin, S. (2012). Implementing PushBack: Router-based Defense Against DDoS Attacks.

[5] Rao, R. (2007). On Scalable Attack Detection in the Network.

[6] Karerna., David. (2009). Scalable Network-Layer Defense Mechanism against Internet Bandwidth Flooding Attack.

[7] Lui, X. (2010). Preventing Internet Denial of Service from Inside Out.

[8] Bogdanoshi, M. (2011). Wireless Network Behavior under ICMP Flood DoS Attack and Mitigation Techniques.

[9] TELELINK. (2013). Corporate WAN Threats, IT Threats – Control Plane Attack.

[10] CSA, Security Guidance. (2014). Construction of digital campus security based cloud computing.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info