scholarly journals A study of the cloud security attacks and threats

2021 ◽  
Vol 1964 (4) ◽  
pp. 042061
Author(s):  
V Sureshkumar ◽  
B Baranidharan
2016 ◽  
Vol 74 ◽  
pp. 98-120 ◽  
Author(s):  
Salman Iqbal ◽  
Miss Laiha Mat Kiah ◽  
Babak Dhaghighi ◽  
Muzammil Hussain ◽  
Suleman Khan ◽  
...  

2017 ◽  
Vol 8 (7) ◽  
pp. 1011-1017
Author(s):  
Mr.Ashish Sharma ◽  
Dr.Sanjay Kumar

Cloud computing enables sharing of data over internet, hence the chances of security attacks also increases. So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks. One of the efficient and improved Trust Model is implemented which increases the strength of Security in Cloud Computing [1]. Here in this paper various Trust Models their advantages and limitations are analyzed and com pare on the basis of various parameters. This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future.


Author(s):  
Tiejun Jia ◽  
Ximing Xiao ◽  
Fujie Zhang ◽  
Zhaohong Feng

2019 ◽  
Vol 7 (2) ◽  
pp. 342-348
Author(s):  
Vaishali Singh ◽  
Kavita Bhatia ◽  
S. K. Pandey

2018 ◽  
Vol 6 (5) ◽  
pp. 473-478
Author(s):  
K. K. Chauhan ◽  
◽  
◽  
A. K. S. Sanger

2014 ◽  
Vol 1 (1) ◽  
pp. 1-5
Author(s):  
Poonam Rawat ◽  
◽  
Neha Rawat ◽  
Shikha Singh ◽  
Awantika . ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document