Security threat on Cloud Computing

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-37 Number-1
Year of Publication : 2016
Authors : Usman Abubakar Idris, Jamilu Awwalu, Buhari kamil


Usman Abubakar Idris, Jamilu Awwalu, Buhari kamil "Security threat on Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V37(1):18-21, July 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Cloud computing offers better, more reliable, more efficient, faster, more spacious data storage and integrity as well as scalability, flexibility, portability and resilience of data and information. It outsources Information Technology (IT) services to business organizations and business companies for adoption and organizational development, allowing the addition of capabilities and service functionalities without the direct corresponding infrastructural investment.

[1] Ahmad, Tauseef et al., 2013. Development of Cloud Computing and Security Issues [online]. The International Institute for Science, Technology and Education (IISTE), ISSN 2224-896X, Vol. 3, No. 1. Available from: [Accessed 22/5/2015]
[2] Astrova, I. et al., 2012. Security of a Public Cloud. s.l., IEEE, p. 564.
[3] Chou, Te-Shun, 2013. Security Threats on Cloud Computing Vulnerabilities. International Journal of Computer Science & Information Technology (IJCSIT), Vol. 5, No. 3.
[4] Drissi S. et al., 2013. Survey: Risk Assessment for Cloud Computing [online]. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, No. 12.
[5] Gowrie, Casey, 2014. Session Hijacking and the Cloud [online]. Available from: dents_works/final_project/fall2014/cgowrie.pdf [Accessed: 1/9/2015]
[6] Intel IT Center, 2013. Virtualization and Cloud Computing [online]. Available from: ments/guides/cloud-computing-virtualization-buildingprivate- iaas-guide.pdf [Accessed: 20/10/2015]
[7] Juniper Networks Inc., 2012. Securing Multi-Tenancy and Cloud Computing [online]. Available from: 2000381-en.pdf [Accessed: 1/10/2015]
[8] Lian-chi, Z. & Chun-di, X., 2012. Cloud Security Service Providing Schemes Based on Mobile Internet Framework. China, IEEE, pp. 307-311.
[9] Katkamwar, Niraj et al., 2012, Securing Cloud Servers against Flooding Based DDoS Attacks. International Journal of Application or Innovation in Engineering & Management, Vol. 1, Issue 3, p. 51.
[10] Kumar, A. Sharath & Reddy, Ch. Sudarshan, 2015, Cloud Computing- Security Challenges. International Journal of Advanced Research In Data-mining and Cloud Computing [online], Vol. 3, Issue 2. Available from: 5d02.pdf [Accessed: 18/10/2015]
[11] Microsoft, 2014. Network Virtualization and Cloud Computing [online]. Available from: 5618-4CE9-8A30- 17DC9D306B47/Microsoft_System_Center_Network_Virt ualization_and_Cloud_Computing_PDF.pdf [Accessed: 31/10/2015]
[12] Parekh, D. H. & Sridaran, R., 2013. An Analysis of Security Challenges in Cloud Computing. International Journal of Advanced Computer Science and Applications[online], Vol. 4, Issue 1. p. 38. Available from: [Accessed: 10/11/2015]
[13] Popović, Krešimir & Hocenski, Željko. Cloud Computing Security Issues and Challenges [online]. Available from: 3317& 2F5512516%2F5533310%2F05533317.pdf%3Farnumber %3D5533317 [Accessed: 9/11/2015]
[14] Rashid, Hasibur, MD, 2014, Bangladesh. Security Challenges of Cloud Computing [online]. Available from: of-cloud-computing [Accessed: 9/11/2015]
[15] Tiwari, P. K. & Mishra, B., 2012. Cloud Computing Security Issues, Challenges and Solution. International Journal Of Emerging Technology and Advanced Engineering, [online] Volume 2, Issue 8, August 2012, 2(8), p. 306. Available from: _0812_53.pdf [Accessed: 9/11/2015]
[16] Yassir, Ammar & Nayak, Smitha, 2012. Cybercrime: A Threat to Network Security [online], Vol. 12, No. 2. Available from: [Accessed: 9/3/2015]

Security, Cloud Computing.