Cloud computing security: Attacks, threats, risk and solutions

被引:0
作者
Kaushik S. [1 ]
Gandhi C. [1 ]
机构
[1] Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida
关键词
Attacks; Cloud computing; IaaS; Infrastructure as a service; PaaS; Platform as a service; Risks; SaaS; Security; Software as a service; Threats;
D O I
10.1504/IJNVO.2018.093926
中图分类号
学科分类号
摘要
Cloud computing started a new promising era in the field of IT and provided a new direction for the efficient use of resources, within the least amount. It becomes a centre of attraction for many organisations, as it allows the users to store data and use the resources dynamically, according to their requirements, from any remote location. But, the biggest challenge is to prevent data from malicious attack. Security and privacy are thus, gaining important consideration. Many researchers addressed various security requirements such as confidentiality, integrity, authenticity etc. in their work, but it is difficult to understand that which security requirements are still lacking behind to investigate. In this paper, we discuss the various possible attacks, threats, risks and security concerns with the possible countermeasures that need to be understood related to the cloud. The current research also investigates that how different cloud frameworks are affected by which network attacks. © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:50 / 71
页数:21
相关论文
共 22 条
[1]  
Almorsy M., Grundy J., Ibrahim A.S., Collaboration-based cloud computing security management framework, IEEE Int. Conference on Cloud Computing (CLOUD), (2011)
[2]  
Arockiam L., Monikandan S., Data security and privacy in cloud storage using hybrid symmetric encryption algorithm, International Journal Advance Research in Computer and Communication Engineering, 2, 8, pp. 3064-3070, (2013)
[3]  
Bacon J., Et al., Information flow control for secure cloud computing, IEEE Transaction on Network and Service Management, 11, 1, pp. 76-89, (2014)
[4]  
Barsoum A., Hasan A., Enabling dynamic data and indirect mutual trust for cloud computing storage systems, IEEE Transactions on Parallel and Distributed Systems, 24, 12, pp. 2375-2385, (2013)
[5]  
Top Threats to Cloud Computing V1. 0, (2010)
[6]  
Isaac E.R.H.P., Isaac J.H.R., Visumathi J., Reverse circle cipher for personal and network security, 2013 International Conference on Information Communication and Embedded Systems (ICICES), (2013)
[7]  
Kumar R.S., Saxena A., Data integrity proofs in cloud storage, Third International Conference on Communication Systems and Networks (COMSNETS), (2011)
[8]  
Li J., Et al., Managing data retention policies at scale, IEEE Transactions on Network and Service Management, 9, 4, pp. 393-406, (2012)
[9]  
Li X., Du J., Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing, IET Inf. Secur., 7, 1, pp. 39-50, (2013)
[10]  
Mell P., Grance T., The NIST Definition of Cloud Computing. Microsoft Azure, (2011)