A Survey on Data Integrity Attacks and DDoS Attacks in Cloud Computing

被引:0
作者
Tian, Yun [1 ]
Nogales, Andres F. Romero [1 ]
机构
[1] Calif State Univ Fullerton, Dept Comp Sci, Fullerton, CA 92634 USA
来源
2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC | 2023年
关键词
Cloud computing; cloud services; service availability; data integrity; cloud security attacks; mitigation approaches;
D O I
10.1109/CCWC57344.2023.10099240
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has become a beneficial and profitable industry due to its main characteristics of pay-as-you-go and scalability. These are the traits that have attracted businesses to transfer their data and services to a cloud platform accessed through the Internet. However, internet based services and remote access to data have become a main concern in this new model. An unstable and insufficient security layer has created a penetrable wall to the assets and services of their customers. In other words, businesses are being targeted by a vast list of security attacks that primarily affect service availability and data integrity. In this survey paper, identification of security attacks affecting service availability and data integrity are established. Moreover, possible solution approaches are studied and analyzed for such attacks.
引用
收藏
页码:788 / 794
页数:7
相关论文
共 17 条
[1]   Detection Techniques for DDoS Attacks in Cloud Environment: Review Paper [J].
Alanazi, Sultan T. ;
Anbar, Mohammed ;
Karuppayah, Shankar ;
Al-Ani, Ahmed K. ;
Sanjalawe, Yousef K. .
INTELLIGENT AND INTERACTIVE COMPUTING, 2019, 67 :337-354
[2]  
Alhenaki L, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS)
[3]  
Bakr A., 2019, INT J ADV SCI TECHNO, V28, P187
[4]  
Ismail M.N., 2012, Int. J. Comput. Sci. Secur, V6, P226
[5]  
Jia Q., 2013, ICCCN, 2013, P1, DOI [10.1109/ICCCN.2013.6614155, DOI 10.1109/ICCCN.2013.6614155]
[6]  
John Jomina, 2019, Advances in Big Data and Cloud Computing. Proceedings of ICBDCC18. Advances in Intelligent Systems and Computing (AISC 750), P11, DOI 10.1007/978-981-13-1882-5_2
[7]  
Jun Feng, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P251, DOI 10.1109/ICPPW.2010.42
[8]  
Kansal V, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), P334, DOI 10.1109/COMPTELIX.2017.8003989
[9]   A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding [J].
Lin, Hsiao-Ying ;
Tzeng, Wen-Guey .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) :995-1003
[10]  
Mell P, 2010, COMMUN ACM, V53, P50