Seven Deadly Threats and Vulnerabilities in Cloud Computing

Cloud computing has been developed to reduce IT expenses and to provide agile IT services to individual users as well as organizations. It moves computing and data away from desktop and portable PCs into large data centers. This technology gives the opportunity for more innovation in lightweight smart devices and it forms an innovative method of performing business. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. This research paper describes the characteristics (threats, vulnerabilities) associated with a stormy cloud.

[1]  Li Shen,et al.  A Novel Hardware Assisted Full Virtualization Technique , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[2]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[3]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[4]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[5]  Mervat Adib Bamiah,et al.  Challenges and Benefits for Adopting the Paradigm of Cloud Computing , 2011 .

[6]  Mark Perry,et al.  Clarifying Privacy in the Clouds , 2011 .

[7]  Stephen Farrell Portable Storage and Data Loss , 2008, IEEE Internet Computing.

[8]  Paul T. Jaeger,et al.  Weathering the Storm: The Policy Implications of Cloud Computing , 2009 .

[9]  James K Wangari Vendor lock-in and cloud computing at seven seas technologies group (SST) , 2013 .