A Study on Security Mitigation Models in Cloud Computing

In the present cloud computing scenario, with varied complication levels among SaaS, PaaS, IaaS, many types of security challenges exist. In order to overcome the above, there also exist many models to mitigate them. With this two way growth, it becomes essential to choose the right mitigation model for a particular class of security threats. This paper aims at analyzing the different mitigation models for various security threats possible across different cloud computing scenarios so that the cloud users, researchers and service providers would get benefited. The cloud computing concept is integrated for the current study and its implications and risks are identified in terms of security.

[1]  Naseer Amara,et al.  Cloud Computing Security Threats and Attacks with Their Mitigation Techniques , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[2]  Mohit Sharma,et al.  Cloud computing and its security issues — A review , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[3]  Shao Ying Zhu,et al.  A survey on top security threats in cloud computing , 2015 .

[4]  Fawaz S. Al-Anzi,et al.  Cloud computing: Security model comprising governance, risk management and compliance , 2014, 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC).

[5]  Sajjad Haider,et al.  Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[6]  Tejaswi Agarwal,et al.  Cloud Computing: Security Issues, Mitigation and a Secure Cloud Architecture , 2012 .

[7]  Ajanthaa Lakkshmanan,et al.  Security concerns and risk at different levels in Cloud Computing , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).

[8]  R. Sridaran,et al.  An Analysis of Security Challenges in Cloud Computing , 2013 .

[9]  Amanpreet Kaur,et al.  Mitigation of DDoS attacks in cloud computing , 2016, 2016 5th International Conference on Wireless Networks and Embedded Systems (WECON).