2011
DOI: 10.1109/msp.2010.115
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Cloud Computing Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
303
0
11

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 604 publications
(314 citation statements)
references
References 1 publication
0
303
0
11
Order By: Relevance
“…A number of recent surveys focus on the identification of privacy concerns related to different cloud service models in terms of potential attacks that exploit the vulnerabilities of cloud technologies [1,14,17,19,26,47]. This paper extends the above by relating cloud threats and vulnerabilities to specific cloud quality properties that raise privacy concerns.…”
Section: Resultsmentioning
confidence: 90%
“…A number of recent surveys focus on the identification of privacy concerns related to different cloud service models in terms of potential attacks that exploit the vulnerabilities of cloud technologies [1,14,17,19,26,47]. This paper extends the above by relating cloud threats and vulnerabilities to specific cloud quality properties that raise privacy concerns.…”
Section: Resultsmentioning
confidence: 90%
“…Sidechannel attack can instantiate new VMs of a target virtual machine so that the new VM can potentially monitor the cache hosted on the same physical machine [7]. There are four possible places where faults can occur in cloud computing: provider-inner, provider-across, provider user and user-across [54]. It is necessary to address any fault arising from these places within the cloud infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…Specific vulnerabilities of major web applications are related to the browser's front-end component. Among them are client-side data manipulation vulnerabilities, where adversaries exploit user components by completely altering legitimate users' input (Grobauer et al 2011). Security mis-configuration is also very critical with multitenancy operations, where each tenant has its own security configurations that may conflict with others, leading to security holes (Yadav et al 2013).…”
Section: Cloud Infrastructurementioning
confidence: 99%
“…The utilisation of web browsers and mobile devices opens up even more opportunities for attack when their vulnerabilities are exploited (Grobauer et al 2011). This has pushed enterprises to use VPN while communicating to the cloud.…”
Section: Cloud Usersmentioning
confidence: 99%
See 1 more Smart Citation