2014
DOI: 10.14419/jacst.v3i2.3588
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Cloud: Threats, Attacks and Mitigation Techniques

Abstract: This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper also suggests mitigation techniques that can be used to reduce or eliminate the risk of the threats discussed. In addit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(18 citation statements)
references
References 47 publications
0
18
0
Order By: Relevance
“…Attackers can abuse this feature by renting VM to hack service engine through other customers' VMs in order to breach and compromise confidential data by breaking the isolation feature that separates customers' data. [23].…”
Section: Abuse Of Cloud Service Threatmentioning
confidence: 99%
See 1 more Smart Citation
“…Attackers can abuse this feature by renting VM to hack service engine through other customers' VMs in order to breach and compromise confidential data by breaking the isolation feature that separates customers' data. [23].…”
Section: Abuse Of Cloud Service Threatmentioning
confidence: 99%
“…Another form of DoS attack is Asymmetric applicationlevel DoS attacks, which is capable of shutting down an application by using small attack payload as 100 bytes [23]. The DoS attacks are usually achieved by exploiting the vulnerabilities, like in web server or applications etc., and overloading the victim machine by sending many requests collectively in order to consume most cloud resources, such as network bandwidth, memory or computation powers, and therefore, causing in delay of cloud services or completely make unavailable of resources and services [4,17].…”
Section: Major Challenges From Abuse Of Cloud Service Threat and Avaimentioning
confidence: 99%
“…All of these are described in this section. (Alani 2014)Cloud computing referred to the delivery of on-demand computing resources everything from applications to data centers-over the Internet on a pay-for-use basis. By using this service you can use any resource without being present there.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Specifically, service requests from cloud users are honored through building and running virtual machines (VMs), and VMs created for different users can be instantiated on the same physical server. While this co‐resident VM architecture provides cost‐effective resource sharing, it poses unique security risks to the cloud users (Alani, ; Godfrey & Zulkernine, ; Ristenpart, Tromer, Shacham, & Savage, ). In particular, an attacker may penetrate its malicious software into the cloud system as regular service requests for creating the attacker's VMs (AVMs).…”
Section: Introductionmentioning
confidence: 99%