Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Date Added: Apr 2014
Cloud computing provides flexible on demand services to the end users with lesser infrastructural investment. Under the supervision of different managements, these services are provided over the Internet using known networking protocols, standards and formats. Existing deficiencies in underlying technologies tend to open doors for intrusion. This paper surveys different intrusions affecting basics of cloud security i.e. availability, confidentiality and integrity of cloud resources and services. It examines proposals incorporating Intrusion Detection Systems (IDS) in cloud and discusses various types and techniques of IDS.