期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2012
卷号:3
期号:4
页码:778-782
语种:English
出版社:Ayushmaan Technologies
摘要:Cloud computing is a virtualization technology which uses sharing the pool of computer resources. Cloud is an emerging technology which combines the features of traditional computing technology with networking technology like parallel, distributed or grid computing. Cloud computing is a new version of internet evolution which can handle large number of customers at a time by sharing the resources over internet. The data owner can remotely store their data in cloud and enjoy the cloud characteristics like ondemand self service, resource pooling, rapid elasticity, ubiquitous network access, rapid elasticity, measured service. Vulnerability is an important factor of risk in cloud computing which is exploited by threat causing harm to system. Cloud vulnerabilities include unauthorized access to management interface, internet protocol vulnerabilities, data recovery vulnerability and metering and billing evasion. Management interface is required for cloud computing on demand characteristics. Unauthorized access to management interface is an issue. The cloud services are accessed over internet using the standard protocol which is entrusted so the network vulnerability is relevant to cloud computing. In cloud we are enjoying pay-peruse that is the service we are using are metered. In this paper is focusing on data recovery vulnerability which uses the cloud characteristics of resource pooling and elasticity of resources. In this the resource allocated to one user is reallocated to different user in later time. The solution we are presenting here is giving strong access control, authentication to administrative access and operations, conducting scanning for vulnerability, complete deletion of user’s data after usage, evaluating the unauthorized environment, make a strong service level agreement for vulnerability remediation, strongly encrypting the data.