More technical risks have been investigated in the cloud computing area. There are many dangers in this area, but we will only talk to the most relevant and important people for the subject matter. These types of risk is to be done with hacking (technical), or face anxiety of people’s attacks.
Usually, the XML signals on the web are disturbed by the attacks. XML is web-based language and cloud computing can also be based on the web, they are related to this issue (Macintoto 2005). This hack form is usually used to obtain data without the rights to access them (Petrasz 2006). A valid user applies for a specific piece of data or information, and hacker interfere with this application. Then he uses the appropriate ‘mark’ of the user to get his data. He sends his application to the cloud, and therefore the cloud recognizes it as the correct user, which it responds with the requested data (Mac Installation 2005). This is a dangerous threat because hacker can work that he is a cloud-valid user.
An example will be a credit card company using cloud. When a user’s employer requests for a client’s personal data, this request sends the cloud to the cloud. Hacker interfere with this application and uses the employee’s name. The employer verifies himself by logging in to the system with his password and username. It provides a mark for this special employee. Now when a hacker interfere with this application, he can work as a employee. Then she can succeed in changing the application for her personal use. The client’s personal data can be converted into a client’s credit card number. The results will talk to themselves.
As we have explained that cloud can be based on the web. Cloud is a kind of remote server, as we now know them (Armberber 2010). We connect to client PC laptop PDA etc. on the cloud and use for input and output. It is also important that it confirms us as ‘Users’. This way we allow access to specific areas in the cloud. All these devices do not connect themselves to the cloud. Actually it’s a browser on machines that set the original connection. Most users have Internet Explorer1, Firefox 2 or Chrome3 installed and used to connect it to the cloud. This link is another security threat and needs protection. This is the browser security that depends on the browser provider.
The browser is used to navigate to the cloud, but is also used to navigate to other websites. These browsers have to read the scripts that are used on the web site. It is important to detect the difference between the abusive script to control the browser’s browser information. A firewall is available for this issue. This security scale is available on the browser used. came. Firefox, Chrome or Internet Explorer.
On the other hand, indirectly denied service. Then it affects the second service when the attacker means hacking a particular service which is directly denied service. This effect depends on the power of computing hacker access. If it tries to cause timing time for a particular service (which is hosted on the server), it may also cause timing time for other services. Servers all of their computing power rely on all requests that are made for a specific service, and therefore there is no computing power to access other applications in the cloud on this specific server. Although it depends on the cloud infrastructure, how bad is such side effects. For instance, the cloud service can be exported to another server when it reports that a particular server is not able to cope with all applications. Before this, other services will take longer.
The risk of non-attacks
Lock is the first effect. This means, in that scenario, an organization can not move to various service providers around its IT (Arthur, 1989). Cloud computing is quite new so there are not yet many standard formats. In addition to this, a cloud provider may be difficult to transfer to another customer for a customer. This means that the client will be “locked in” to this specific provider. In other words, the client becomes the dependent on the cloud provider. Any problems with the cloud provider appear on their clients’s IT. Due to lack of standard, their data will be attempted to move to another cloud provider.
As there are different services in cloud computing, there are different lockes in the effect. First to speak a Saudi lock is locked. As we still have, the company’s information passes through the cloud, with the sauce. The provider is a custom database that is available to the client. They are responsible when customers have to get this database information form