A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review

Authors

  • Arun Kumar M Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology (Deemed to be University), Chennai, Tamil Nadu, India
  • K Ashok Kumar Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology (Deemed to be University), Chennai, Tamil Nadu, India

Keywords:

Authentication attacks, Malware Injection, Side- Channel, Denial of Service, Flooding

Abstract

The security challenges are more in the area of Cloud computing platform. The On-demand service of Cloud Computing secures a vital role in the industrial development and other IT sectors. This paper will try to provide the information based on the current threats and attacks on Cloud Computing and the solution to those attacks. Cloud Computing provides various set of service models like Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) respectively. The cloud security measures are still a challenging task for organizations and other IT Sectors to handle the external attacks. Concluding that this survey will leads to give an overview of threats, attacks and vulnerabilities in the era of Cloud platform as well as some of the countermeasures to protect the cloud.

References

Suryateja, P. S. (2018). Threats and vulnerabilities of cloud computing: a review. International Journal of Computer Sciences and Engineering, 6(3), 297-302.

Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security & Its Applications, 6(1), 25.

Kumar, P. (2016). Cloud computing: threats, attacks and solutions. International Journal of Emerging Technologies in Engineering Research (IJETER), 4(8), 24-28.

Ahmed, S. T., Kumar, V. V., Singh, K. K., Singh, A., Muthukumaran, V., & Gupta, D. (2022). 6G enabled federated learning for secure IoMT resource recommendation and propagation analysis. Computers and Electrical Engineering, 102, 108210.

Parveen, A., Ahmed, S. T., Gulmeher, R., & Fatima, R. (2021, January). VANET’s Security, Privacy and Authenticity: A Study. In Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India.

Sqalli, M. H., Al-Haidari, F., & Salah, K. (2011, December). Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing. In 2011 Fourth IEEE international conference on utility and cloud computing (pp. 49-56). IEEE.

Deshmukh, R. V., & Devadkar, K. K. (2015). Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science, 49, 202-210.

Al-Shammari, N. K., Alzamil, A. A., Albadarn, M., Ahmed, S. A., Syed, M. B., Alshammari, A. S., & Gabr, A. M. (2021). Cardiac Stroke Prediction Framework using Hybrid Optimization Algorithm under DNN. Engineering, Technology & Applied Science Research, 11(4), 7436-7441.

Ahmed, S. T., Ashwini, S., Divya, C., Shetty, M., Anderi, P., & Singh, A. K. (2018). A hybrid and optimized resource scheduling technique using map reduce for larger instruction sets. International Journal of Engineering & Technology, 7(2.33), 843-846.

https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/

https://theappsolutions.com/blog/development/cloud-security-risks/

Downloads

Published

2022-11-05

How to Cite

Arun Kumar M, & K Ashok Kumar. (2022). A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review. International Journal of Human Computations & Intelligence, 1(3), 13–18. Retrieved from https://milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/34