Please use this identifier to cite or link to this item:
Title: Security threats and attacks on cloud computing systems an empirical study
Researcher: Neeta Sharma
Guide(s): Mayank Singh
University: Noida International University
Completed Date: 
Abstract: Cloud computing is one of the most powerful innovation that has caught fancy newlineof technologists around the world. Cloud Computing has enormous advantages newlinebut also share many security risks that no organisation can afford to overlook. newlineSuccessful implementation of Cloud Computing in an enterprise, requires newlineproper planning and understanding of emerging risks, threats, vulnerabilities, newlineand possible countermeasures. Therefore, the identification of most newlineappropriate solution directives to strengthen security in the cloud environment newlinehas become paramount for all operations in the cloud. In our study, we are newlineexploring and analyzing the prominent network security and data security newlineattacks on the cloud systems on the basis of literature review. newlineThe research was based on three major objectives; firstly, to study cloud newlinenetwork attacks, Secondly, to study data security attacks and propose newlineprevention techniques against one of them. Lastly, to investigate reason(s) for newlinereluctance in adoption of Cloud Computing by consumers with respect to newlinesecurity and threat. This thesis provides the basic research work needed for implementation of our newlineproposed algorithms in the field of network security, data security and cloud newlineadoption strategy. It will ensure to mitigate the risk of security threats newlineespecially of network security and of data security threats. However, due to newlinenon-availability of resources, we are not able to carry out practical newlineimplementation of our proposed solutions on real cloud networks. Theimplementation of our proposed algorithm along with current tools and newlinetechniques would be cost effective and secure solution to the problems of newlinecloud network. This research work would also act as a beckon for directing newlinefuture research that may require renewed concentration on security threats on newlinepublic cloud to win the trust of organizations so that they migrate their newlinebusiness into cloud. Our survey results could also be used in future by the newlineindustry to enhance adaptation, propagate awareness and thus improve the newlinesecurity of cloud networks. newline
Appears in Departments:Department of Computer Science and Engineering / IT

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File61.5 kBAdobe PDFView/Open
02_certificate.pdf140.01 kBAdobe PDFView/Open
03_contents.pdf84.35 kBAdobe PDFView/Open
04_list of tables.pdf46.84 kBAdobe PDFView/Open
05_list of figures.pdf57.28 kBAdobe PDFView/Open
06_acknowledgements.pdf69.6 kBAdobe PDFView/Open
07_chapter 1.pdf460.95 kBAdobe PDFView/Open
08_chapter 2.pdf450.79 kBAdobe PDFView/Open
09_chapter 3.pdf144.96 kBAdobe PDFView/Open
10_chapter 4.pdf214.97 kBAdobe PDFView/Open
11_chapter 5.pdf278.84 kBAdobe PDFView/Open
12_chapter 6.pdf534.49 kBAdobe PDFView/Open
13_chapter 7.pdf82.9 kBAdobe PDFView/Open
appendix and publications.pdf417.38 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.