<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 12 Issue 3</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science </IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>May - June 2024</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2024</Year>
        <Month>05</Month>
        <Day>24</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Securing the Skies- A Critical Analysis of Cloud Infrastructure Vulnerabilities</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>87</FirstPage>
      <LastPage>95</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Vaishnavi Chaudhari</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Poonam Dhake</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
                    <FirstName>Snehal Salunkhe</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
                    <FirstName>Mahendra Suryavanshi</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.55524/ijircst.2024.12.3.14</DOI>
      <Abstract>Cloud computing offers storage, infrastructure, computing, networking, databases, platform, software, and analytics services over the Internet. It provides numerous benefits including scalability, cost management, broad access to resources, elasticity, resource pooling. Though cloud computing is mature and widely adopted computing model in software as well as non-software industries, it has several issues regarding security as it provides most of the cloud services over the public infrastructure. Denial of service (DOS), malware injection, insecure APIs, data loss, data breaches, hypervisor vulnerabilities, VM escape are a few major issues in cloud computing. In this paper, authors tried to provide a comprehensive analysis of critical security issues in cloud computing. Furthermore, this paper critically analyses the existing solutions to the various security issues in the cloud computing model.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Cloud Security, Authentication, Access Control, Hypervisor, Data Breaches</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=1266</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>