A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review
Keywords:
Authentication attacks, Malware Injection, Side- Channel, Denial of Service, FloodingAbstract
The security challenges are more in the area of Cloud computing platform. The On-demand service of Cloud Computing secures a vital role in the industrial development and other IT sectors. This paper will try to provide the information based on the current threats and attacks on Cloud Computing and the solution to those attacks. Cloud Computing provides various set of service models like Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) respectively. The cloud security measures are still a challenging task for organizations and other IT Sectors to handle the external attacks. Concluding that this survey will leads to give an overview of threats, attacks and vulnerabilities in the era of Cloud platform as well as some of the countermeasures to protect the cloud.
References
Suryateja, P. S. (2018). Threats and vulnerabilities of cloud computing: a review. International Journal of Computer Sciences and Engineering, 6(3), 297-302.
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Kumar, P. (2016). Cloud computing: threats, attacks and solutions. International Journal of Emerging Technologies in Engineering Research (IJETER), 4(8), 24-28.
Ahmed, S. T., Kumar, V. V., Singh, K. K., Singh, A., Muthukumaran, V., & Gupta, D. (2022). 6G enabled federated learning for secure IoMT resource recommendation and propagation analysis. Computers and Electrical Engineering, 102, 108210.
Parveen, A., Ahmed, S. T., Gulmeher, R., & Fatima, R. (2021, January). VANET’s Security, Privacy and Authenticity: A Study. In Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India.
Sqalli, M. H., Al-Haidari, F., & Salah, K. (2011, December). Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing. In 2011 Fourth IEEE international conference on utility and cloud computing (pp. 49-56). IEEE.
Deshmukh, R. V., & Devadkar, K. K. (2015). Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science, 49, 202-210.
Al-Shammari, N. K., Alzamil, A. A., Albadarn, M., Ahmed, S. A., Syed, M. B., Alshammari, A. S., & Gabr, A. M. (2021). Cardiac Stroke Prediction Framework using Hybrid Optimization Algorithm under DNN. Engineering, Technology & Applied Science Research, 11(4), 7436-7441.
Ahmed, S. T., Ashwini, S., Divya, C., Shetty, M., Anderi, P., & Singh, A. K. (2018). A hybrid and optimized resource scheduling technique using map reduce for larger instruction sets. International Journal of Engineering & Technology, 7(2.33), 843-846.
https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/
https://theappsolutions.com/blog/development/cloud-security-risks/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Arun Kumar M, K Ashok Kumar
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.