2016 18th International Conference on Advanced Communication Technology (ICACT) 2016
DOI: 10.1109/icact.2016.7423296
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of cloud computing attacks and countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Therefore, the privacy of data transactions should be protected. This is a problem in centralized storage systems, which are really common in finance or industry, since such an infrastructure can suffer attacks or internal leaks [101], [102]. To prevent such issues, blockchain decentralizes storage.…”
Section: F Information Securitymentioning
confidence: 99%
“…Therefore, the privacy of data transactions should be protected. This is a problem in centralized storage systems, which are really common in finance or industry, since such an infrastructure can suffer attacks or internal leaks [101], [102]. To prevent such issues, blockchain decentralizes storage.…”
Section: F Information Securitymentioning
confidence: 99%
“…Commonly, FL architecture comprises a server or a cluster of servers living in the cloud. A cloud-based or a physical server can be a target for cloud computing and hacking attacks [36], [37] or Distributed Denial of service (DDos) attacks [38]. Furthermore, a compromised server can inspect all gradient updates sent to the server in any training rounds and tamper with the aggregation process.…”
Section: ) Compromised Servermentioning
confidence: 99%
“…This is due to the fact that most of the data that is produced from IoT devices, like wearables and smart home devices, are very sensitive and private to their owners. With regard to the data that is produced and stored in IoT applications, it has been observed over the years that the system architectures and solutions have been built around centralized communications and [112,113]. If centralized systems cannot be trusted, then blockchains offer a decentralized system or approach that incorporates many nodes, that means no down times, and if one node is comprised, the others can keep the system running efficiently (iii) Availability.…”
Section: Current Challenges Faced In Biot Applicationsmentioning
confidence: 99%