Comparison of Cloud Computing Security Threats and Their Counter Measures

  • Shourya RohillaEmail author
  • Rejo Mathew
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)


One of the major driving forces in the current technological world, is the concept of cloud computing. Many companies and organizations have their precious data stored on various cloud computing platforms. Organizations depend on cloud computing will effectively manage the excessive data quantity and handle them. In such a scenario, a breach of that data or any major threat can cause huge damage to the image and financial position of the company. Due to a security breach, if all of those data is leaked to an unauthorized intruder, it can lead to severe manipulations of that data and cause huge losses to the assets of the company. Hence, various counter measures to tackle those security issues are discussed in this paper. All the possible data issues are listed out and the various methods to counter them are discussed.


Cloud computing Confidentiality Integrity Availability Authentication Intrusion Detection Systems 


  1. 1.
    Ravi Kumar, P., Herbert Raj, P., Jelciana, P.: Exploring data security issues and solutions in cloud computing. In: 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7–8 December (2017)Google Scholar
  2. 2.
    Kazim, M., Zhu, S.Y.: A survey on top security threats in cloud computing. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 6(3) (2015)Google Scholar
  3. 3.
    Kumar, S.V.K., Padmapriya, S.: A survey on cloud computing security threats and vulnerabilities. Int. J. Innov. Res. Electr. Electron. instrum. Control Eng. 2(1), 622–625 (2014)Google Scholar
  4. 4.
    Ahmat, K.A.: Emerging Cloud Computing Security Threats, vol. 2, Department of Information Technology City University of New York (2016)Google Scholar
  5. 5.
    Worlanyo, E.: A survey of cloud computing security: Issues, challenges and solutions, 20 August 2017Google Scholar
  6. 6.
    Jakimoski, K.: Security techniques for data protection in cloud computing. Int. J. Grid Distrib. Comput. 9(1), 49–56 (2016)CrossRefGoogle Scholar
  7. 7.
    Group, T.T.W., et al.: The Notorious Nine: Cloud Computing Top Threats, Cloud Security Alliance (2013)Google Scholar
  8. 8.
    Alliance, C.S.: Top Threats to Cloud Computing v1. 0, Cloud Security Alliance (2010)Google Scholar
  9. 9.
    Cloud Security Report Spring: JSAI M International Conference of Smart Computing. Accessed 08 Nov 2014Google Scholar
  10. 10.
    Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM (2009)Google Scholar
  11. 11.
    Takebayashi, T., Tsuda, H., Hasebe, T., Masuoka, R.: Data loss prevention technologies. Fujitsu Sci. Tech. J. 46(1), 47–55 (2010)Google Scholar
  12. 12.
    Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRefGoogle Scholar
  13. 13.
    Roschke, S., Cheng, F., Meinel, C.: Intrusion detection in the cloud. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009. DASC 2009. IEEE (2009)Google Scholar
  14. 14.
    Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM (2003)Google Scholar
  15. 15.
    Sridhar, S., Smys, S.: A Survey on cloud security ıssues and challenges with possible measures. In: International Conference on Inventive Research in Engineering and Technology, vol. 4 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyNMIMS (Deemed-to-be) UniversityMumbaiIndia

Personalised recommendations