| 1 | Title of the Article | Detail Study of Cloud Infrastructure Attacks and Security Techniques |
| 2 | Author's name | Surendranath Singh B.G.: Research Scholar, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India (surendranathsingh.bg@gmail.com) |
| 3 | Author's name | Dr. Sunil Phulre |
| 4 | Subject | Computer Science and Engineering |
| 5 | Keyword(s) | Cloud Computing, Multi-tenant, Trust Computing, Resource Management |
| 6 | Abstract | Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attacks from insider or outsider, human or bot. Many researchers are working continuously to resolve the issues by introducing policies, algorithms for accessing and storage of client data. This paper gives a detailed survey on IAAS security issues. A virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of the cloud. Tenant-based measures were also in the solutions to various issues. Paper has listed some of the trust techniques developed by researchers for identifying any malicious machine. |
| 7 | Publisher | Innovative Research Publication |
| 8 | Journal Name; vol., no. | International Journal of Innovative Research in Computer Science & Technology (IJIRCST); Volume-9 Issue-2 |
| 9 | Publication Date | March 2021 |
| 10 | Type | Peer-reviewed Article |
| 11 | Format | |
| 12 | Uniform Resource Identifier | https://ijircst.org/view_abstract.php?title=Detail-Study-of-Cloud-Infrastructure-Attacks-and-Security-Techniques&year=2021&vol=9&primary=QVJULTU2NA== |
| 13 | Digital Object Identifier(DOI) | 10.21276/ijircst.2021.9.2.4 https://doi.org/10.21276/ijircst.2021.9.2.4 |
| 14 | Language | English |
| 15 | Page No | 21-27 |