<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 9 Issue 2</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science and Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March - April 2021</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2021</Year>
        <Month>03</Month>
        <Day>20</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Detail Study of Cloud Infrastructure Attacks and Security Techniques</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>21</FirstPage>
      <LastPage>27</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Surendranath Singh B.G.</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Dr. Sunil Phulre</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.21276/ijircst.2021.9.2.4</DOI>
      <Abstract>Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses&amp;nbsp;of the cloud attract different industries in the recent decade, but this brings security challenges against attacks from insider or outsider, human or bot. Many researchers are working continuously to resolve the issues by introducing policies, algorithms for accessing and storage of client data. This paper gives a detailed survey on IAAS security issues. A virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of the cloud. Tenant-based measures were also in the solutions to various issues. Paper has listed some of the trust techniques developed by researchers for identifying any malicious machine.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Cloud Computing, Multi-tenant, Trust Computing, Resource Management</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=564</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>