A Review Of Cloud Computing Security: Threats Attacks and Algorithms
Author(s)
Umma Khatuna Jannat, M.Mohnakumar
Published Date
September 12, 2024
DOI
your-doi-here
Volume / Issue
Vol. 16 / Issue 6
Abstract
Cloud technology is fast expanding that allows customers to access dependable and scalable on-demand services while incurring lower infrastructure costs. Even though the cloud providers have a heap of benefits, also a heap of disadvantages, such as security threats. The major disadvantage in cloud computing security is Threatsattacks, which are the consequence of the aforementioned shortcomings. Cloud Malware Injection Attacks, Cloud Domain Hijacking, Cloud Data Confidentiality, Cloud Integrity of Data, Cloud Data Availability, Unknown Risk Profile, Man-in-the-Cloud Attacks, CAPTCHA Breaking and Hacking Attacks on Google are only little examples of security Threatsattacks. Support Vector Machine (SVM), Naive Bayes, Decision Tree, Logistic Regression, and Ensemble approaches can be used to detect this Threatsattack in the cloud and these are the machine learning algorithms. We have primarily concentrated on various security threats, cloud-based attacks, and the methods used to identify these Threatsattacks in this work.
View Full Article
Download or view the complete article PDF published by the author.