logo

Security Threats in Cloud Computing PDF

   

Added on  2021-06-17

15 Pages3403 Words51 Views
Running head: SECURITY THREATS IN CLOUD COMPUTING
SECURITY THREATS IN CLOUD
COMPUTING AND PREVENTIVE
METHOD
Name of the University
Name of the student
Author Note
EMAIL ADDRESS

SECURITY THREATS IN CLOUD COMPUTING1
ACKNOWLEDGEMENT
I would like to express my gratitude to my teachers and lecturers who have provided me this
opportunity of performing this research project. I would also like to thank my parents and
friends for helping me in certain section of the finalized project within the limited time frame.

SECURITY THREATS IN CLOUD COMPUTING2
ABSTRACT
In the following report, an overview of the cloud technology has been provided. The report
mentions the application of the mentioned technology and discusses the security threats that
are associated with it. The future research direction of the technology has been mentioned
and the challenge gaps of the technology that is not mentioned properly has been discussed.
Moreover, the report also includes a section where a reflection of the critical issues has been
mentioned. Lastly, in the proposed design section of the report the preventative measures of
the mentioned security threats has been evaluated and discussed conclusively.
Keywords cloud computing, cloud computing threats and security threats of cloud
computing

SECURITY THREATS IN CLOUD COMPUTING3
Table of Contents
INTRODUCTION......................................................................................................................5
Research Problem...................................................................................................................6
Research Justification.............................................................................................................6
LITERATURE REVIEW...........................................................................................................6
Overview of cloud technology...............................................................................................6
Relevant technologies and applications of cloud computing.................................................6
Security challenges/problems of cloud computing................................................................7
Issues that have not been mentioned appropriately................................................................9
Personal views on the critical issues....................................................................................10
Future research directions of the technology.......................................................................10
PROPOSED DESIGN..............................................................................................................11
CONCLUSION........................................................................................................................12
REFERENCES.........................................................................................................................14

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC595 Information Security : Doc
|5
|3376
|100

Applied Research On Security of Data
|12
|2956
|40

Security threats in cloud computing and preventive methods
|11
|2278
|63

Project Proposal and Plan, Cloud Security - ITC 568
|12
|2096
|1387

A Comprehensive Study on Big Data Security and Integrity over Cloud Storage
|16
|3783
|392

Cloud Computing in Financial Sector: Current Security, Privacy Issues and Its Solutions
|16
|3933
|310