Defeating Attacks in Cloud Computing
Poonam Bobade1, Seematai Wadekar2, Nisha Pagare3, K.S.Warke4
1Miss. Poonam Bobade, Computer Engineering, Bharati Vidyapeeth’s college of engineering for women, Pune, India.
2Miss. Seematai Wadekar, , Computer Engineering, Bharati Vidyapeeth’s college of engineering for women, Pune, India.
3Miss. Nisha Pagare, Computer Engineering, Bharati Vidyapeeth’s college of engineering for women, Pune, India.
4Prof. K.S.Warke,Computer Engineering, Bharati Vidyapeeth’s college of engineering for women, Pune, India .

Manuscript received on January 05, 2014. | Revised Manuscript received on January  11, 2014. | Manuscript published on January 15, 2014. | PP: 14-15 | Volume-2 Issue-2, January 2014. | Retrieval Number: B0569012214/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As vulnerabilities keep increasing exponentially every year, the need to efficiently classify, manage, and analyze them also increases. As more and more users, becomes very important to have proper vulnerability management in cloud. In this paper presentation of vulnerability management framework for cloud computing is represented. Cloud computing is a new environment in computer oriented services. It is not an easy task to securely maintain all essential data where it has the need in many applications for clients in cloud. To maintain our data in cloud, it may not be fully trustworthy because client doesn’t have copy of all stored data. Therefore the security is the biggest problem of this system, because the services of cloud computing is based on the sharing. So, the preventive measures of, the different types of attacks in cloud computing services is described.
Keywords: Cloud Computing, D-DOS, IP Spoofing, Malware, Security, Vulnerability.