Professional Documents
Culture Documents
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
Abstract
Cloud computing is a network based or internet
based technology, which gives dynamic resource
services for the customer on demands. It moves data
away from desktop & PCs into large data centers.
Cloud services are delivered from data centers
through the world .It is a totally internet based
service. It uses as a pay-per-use pattern through the
network. Cloud computing is a service of „Networks
of Networks‟. Third party involvements also present
there. So secure architecture is important to keep
Cloud computing data safe from the beginning cloud
computing, it provides better service, low-cost
services etc .Despite that there are several
threatened risks in cloud computing, the aim of this
paper is to study on “Threatened risks for cloud
computing security & how to overcome those risks”.
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
EE--m
maaiill :: anveshanaindia@gmail.com , W Weebbssiittee :: www.anveshanaindia.com
1
AIJREAS VOLUME 1, ISSUE 5 (2016, May) (ISSN-2455-6300) Online
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
EE--m
maaiill :: anveshanaindia@gmail.com , W Weebbssiittee :: www.anveshanaindia.com
2
AIJREAS VOLUME 1, ISSUE 5 (2016, May) (ISSN-2455-6300) Online
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
EE--m
maaiill :: anveshanaindia@gmail.com , W Weebbssiittee :: www.anveshanaindia.com
3
AIJREAS VOLUME 1, ISSUE 5 (2016, May) (ISSN-2455-6300) Online
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
Various types of malicious scripts are Above we already discussed some risk and
added into the web in this kind of attack. It mitigation tools.
can happen 2 ways like Stored XSS and
Reflected XSS.One used permanently; one A. Qualys
is not permanently [10.]
It secure devices and web apps & or this
Mitigation:Provide or apply some error- no hardware and software are required. If
prone data sanitization mechanism, defense there is any malware found if fix problem,
mechanism both client -side and server - scan apps and safe web apps in cloud
side. security.
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
EE--m
maaiill :: anveshanaindia@gmail.com , W Weebbssiittee :: www.anveshanaindia.com
4
AIJREAS VOLUME 1, ISSUE 5 (2016, May) (ISSN-2455-6300) Online
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
EE--m
maaiill :: anveshanaindia@gmail.com , W Weebbssiittee :: www.anveshanaindia.com
5
AIJREAS VOLUME 1, ISSUE 5 (2016, May) (ISSN-2455-6300) Online
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
Author’s Profile
MALLAIAH VANGURI
presently working as Assistant professor in
KRANTHI KIRAN G presently CMR TECHICAL CAMPUS, Hyderabad,
working as a Assistant Professor in CMR Telangana, INDIA. He received M.TECH
Technical campus, Hyderabad, Telangana, (CSE) form MTIST JNTUH in 2013,
INDIA. He received his M.Tech (CSE) B.TECH (CSE) 2005 from TEC in JNTUH.
degree from Sphoorthy Engineering College His field of interest is networking.
in the year 2012.He received B.E. (CSE)
degree from M.V.S.R Engineering College,
in the year 2009. His fields of interests are
Cloud Computing, Machine learning,
Network Security, etc.
REGONDA NAGARAJU
presently working as a Assistant Professor in
CMR Technical campus, Hyderabad,
Telangana, INDIA. He received his M.Tech
(CSE) degree from JNTU Hyderabad in the
year 2011.He received B.Tech. (CSE)
degree from JNTU Hyderabad, in the year
2006. His fields of interests are Image
Processing, Machine learning, Network
Security, Cloud Computing, etc.
AAnnvveesshhaannaa’’ss IInntteerrnnaattiioonnaall JJoouurrnnaall ooff RReesseeaarrcchh iinn EEnnggiinneeeerriinngg aanndd AApppplliieedd SScciieenncceess
EE--m
maaiill :: anveshanaindia@gmail.com , W Weebbssiittee :: www.anveshanaindia.com
6