Skip to main content

2021 | OriginalPaper | Buchkapitel

A Survey on Cloud Computing Security Issues, Attacks and Countermeasures

verfasst von : Deepak Ranjan Panda, Susanta Kumar Behera, Debasish Jena

Erschienen in: Advances in Machine Learning and Computational Intelligence

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is an emerging technology which has laid the foundation of a new approach to computation for individuals as well as enterprises. There is an increasing trend of cloud adoption in recent years. Security has always been a major concern in cloud. Cloud platforms and computations are constantly under threats from attackers. In this paper, we will make a survey on major security concerns, attacks as well as solutions to limit the possibilities of attack in a cloud computing environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat P.M. Mell, T. Grance, The NIST definition of cloud computing, in Computer Security Publications from the National Institute of Standards and Technology (NIST) SP 800145 (National Institute of Standards & Technology, Gaithersburg, 2011) P.M. Mell, T. Grance, The NIST definition of cloud computing, in Computer Security Publications from the National Institute of Standards and Technology (NIST) SP 800145 (National Institute of Standards & Technology, Gaithersburg, 2011)
2.
Zurück zum Zitat Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance [online] Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance [online]
4.
Zurück zum Zitat T.S. Chou, Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. Inf. Technol. 5(3), 79 (2013) T.S. Chou, Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. Inf. Technol. 5(3), 79 (2013)
5.
Zurück zum Zitat R. Chowdhury, Security in cloud computing. Int. J. Comput. Appl. 96(15), 0975–8887 (2014) R. Chowdhury, Security in cloud computing. Int. J. Comput. Appl. 96(15), 0975–8887 (2014)
7.
Zurück zum Zitat D.Q.L. Shilpashree Srinivasamurthy, Survey on Cloud Computing Security. Indiana University, US D.Q.L. Shilpashree Srinivasamurthy, Survey on Cloud Computing Security. Indiana University, US
8.
Zurück zum Zitat S. Kumar, R. Goudar, Cloud computing—research issues, challenges, architecture, platforms and applications: a survey. Int. J. Future Comput. Commun. 356–360 (2012) S. Kumar, R. Goudar, Cloud computing—research issues, challenges, architecture, platforms and applications: a survey. Int. J. Future Comput. Commun. 356–360 (2012)
9.
Zurück zum Zitat Software as a Service (SaaS). Cloud Taxonomy. Open crowd Software as a Service (SaaS). Cloud Taxonomy. Open crowd
10.
Zurück zum Zitat W. Huang, A. Ganjali, B. Kim, S. Oh, D. Lie, The state of public infrastructure-as-a-service cloud security. ACM Comput. Surv. 47, 4, 68, 31 (2015) W. Huang, A. Ganjali, B. Kim, S. Oh, D. Lie, The state of public infrastructure-as-a-service cloud security. ACM Comput. Surv. 47, 4, 68, 31 (2015)
11.
Zurück zum Zitat M. Boniface et al., Platform-as-a-service architecture for real-time quality of service management in clouds, in 5th International Conference on Internet and Web Applications and Services ICIW) (Barcelona, Spain: IEEE), pp. 155–160. https://doi.org/10.1109/iciw.2010.91 M. Boniface et al., Platform-as-a-service architecture for real-time quality of service management in clouds, in 5th International Conference on Internet and Web Applications and Services ICIW) (Barcelona, Spain: IEEE), pp. 155–160. https://​doi.​org/​10.​1109/​iciw.​2010.​91
12.
Zurück zum Zitat W.C.N. Nimit Kaura, C.A.L. Lal, Survey paper on cloud computing security, in International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) W.C.N. Nimit Kaura, C.A.L. Lal, Survey paper on cloud computing security, in International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
13.
Zurück zum Zitat There’s No Such Thing As A Private Cloud. Information Week. 30 June 2010 There’s No Such Thing As A Private Cloud. Information Week. 30 June 2010
15.
Zurück zum Zitat D. Zissis, D. Lekkas, Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012) D. Zissis, D. Lekkas, Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
16.
Zurück zum Zitat Y. Jiang, C. Perng, T. Li, R. Chang, Selfadaptive cloud capacity planning, in Proceedings of the 2012 IEEE Ninth International Conference on Services Computing (SCC) (IEEE, 2012), pp. 73–80 Y. Jiang, C. Perng, T. Li, R. Chang, Selfadaptive cloud capacity planning, in Proceedings of the 2012 IEEE Ninth International Conference on Services Computing (SCC) (IEEE, 2012), pp. 73–80
17.
Zurück zum Zitat M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, E. Dubois, Security transparency: the next frontier for security research in the cloud. J. Cloud Computing 4(1), 1–14 (2015) M. Ouedraogo, S. Mignon, H. Cholez, S. Furnell, E. Dubois, Security transparency: the next frontier for security research in the cloud. J. Cloud Computing 4(1), 1–14 (2015)
18.
Zurück zum Zitat B. Sumitra, C.R. Pethuru, M. Misbahuddin, A survey of cloud authentication attacks and solution approaches. Int. J. Innov. Res. Comput. Commun. Eng. 2(10) (2014) B. Sumitra, C.R. Pethuru, M. Misbahuddin, A survey of cloud authentication attacks and solution approaches. Int. J. Innov. Res. Comput. Commun. Eng. 2(10) (2014)
19.
Zurück zum Zitat N. Fotiou, A. Machas, G.C. Polyzos, G. Xylomenos, Access control as a service for the Cloud. J. Internet Serv. Appl. (2015). ISSN 1869–0238 N. Fotiou, A. Machas, G.C. Polyzos, G. Xylomenos, Access control as a service for the Cloud. J. Internet Serv. Appl. (2015). ISSN 1869–0238
20.
Zurück zum Zitat C. Rogers, L. Duranti, Ethics in the cloud. J. Contemp. Archival Stud. 4(2) (2017) C. Rogers, L. Duranti, Ethics in the cloud. J. Contemp. Archival Stud. 4(2) (2017)
22.
Zurück zum Zitat S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011) S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
23.
Zurück zum Zitat G. Somani, M.S. Gaur, D. Sanghi, M. Conti, R. Buyya, DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput. Commun. 107, 30–48 (2017) G. Somani, M.S. Gaur, D. Sanghi, M. Conti, R. Buyya, DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput. Commun. 107, 30–48 (2017)
24.
Zurück zum Zitat T.K. Subramaniam, B Deepa, Security attack issues and mitigation techniques in cloud computing environments. Int. J. UbiComp 7(1), 1–11 T.K. Subramaniam, B Deepa, Security attack issues and mitigation techniques in cloud computing environments. Int. J. UbiComp 7(1), 1–11
25.
Zurück zum Zitat A. Singh, K. Chatterjee, Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79, 88–115 (2017) A. Singh, K. Chatterjee, Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79, 88–115 (2017)
26.
Zurück zum Zitat P. Deshpande, S.C. Sharma, S.K. Peddoju, A. Abraham, Security and service assurance issues in cloud environment. Int. J. Syst. Assur. Eng. Manage. 9(1), 194–207 (2018) P. Deshpande, S.C. Sharma, S.K. Peddoju, A. Abraham, Security and service assurance issues in cloud environment. Int. J. Syst. Assur. Eng. Manage. 9(1), 194–207 (2018)
27.
Zurück zum Zitat A. Akbarabadi, M. Zamani, S. Farahmandian, J.M. Zadeh, S.M. Mirhosseini, An overview on methods to detect port scanning attacks in cloud computing, p. 6 A. Akbarabadi, M. Zamani, S. Farahmandian, J.M. Zadeh, S.M. Mirhosseini, An overview on methods to detect port scanning attacks in cloud computing, p. 6
28.
Zurück zum Zitat A. Singh, D.M. Shrivastava, Overview of attacks on cloud computing 1(4), 3 (2012) A. Singh, D.M. Shrivastava, Overview of attacks on cloud computing 1(4), 3 (2012)
29.
Zurück zum Zitat S. Anwar et al., Cross-VM cache-based side channel attacks and proposed prevention mechanisms: a survey. J. Netw. Comput. Appl. 93, 259–279 (2017) S. Anwar et al., Cross-VM cache-based side channel attacks and proposed prevention mechanisms: a survey. J. Netw. Comput. Appl. 93, 259–279 (2017)
30.
Zurück zum Zitat P. Mishra, E.S. Pilli, V. Varadharajan, U. Tupakula, Intrusion detection techniques in cloud environment: a survey. J. Netw. Comput. P. Mishra, E.S. Pilli, V. Varadharajan, U. Tupakula, Intrusion detection techniques in cloud environment: a survey. J. Netw. Comput.
Metadaten
Titel
A Survey on Cloud Computing Security Issues, Attacks and Countermeasures
verfasst von
Deepak Ranjan Panda
Susanta Kumar Behera
Debasish Jena
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5243-4_47

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.