Skip to main content

2016 | OriginalPaper | Buchkapitel

2. About Cloud Security

verfasst von : Mohammed M. Alani

Erschienen in: Elements of Cloud Computing Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter starts by discussing how cloud computing security is different from classical network security. The chapter mentions some threats and attacks that apply specifically to cloud computing. The chapter elaborates on most recent real-life attacks to cloud computing in the past few years. The chapter also explains the history of Denial of Service attacks along with other attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat R. Shirey, Rfc 2828: Internet security glossary, in The Internet Society (2000), p. 13 R. Shirey, Rfc 2828: Internet security glossary, in The Internet Society (2000), p. 13
2.
Zurück zum Zitat W. Stallings, Cryptography and Network Security, 4/E (Pearson Education, Upper Saddle River, 2006) W. Stallings, Cryptography and Network Security, 4/E (Pearson Education, Upper Saddle River, 2006)
3.
Zurück zum Zitat J. Idziorek, M. Tannian, D. Jacobson, Attribution of fraudulent resource consumption in the cloud, in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD), 2012, pp. 99–106 J. Idziorek, M. Tannian, D. Jacobson, Attribution of fraudulent resource consumption in the cloud, in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD), 2012, pp. 99–106
4.
Zurück zum Zitat M.M. Alani, Manet security: a survey, in Proceedings of the IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2014, pp. 559–564 M.M. Alani, Manet security: a survey, in Proceedings of the IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2014, pp. 559–564
5.
Zurück zum Zitat R.V. Deshmukh, K.K. Devadkar, Understanding ddos attack & its effect in cloud environment. Procedia Comput. Sci. 49, 202–210 (2015)CrossRef R.V. Deshmukh, K.K. Devadkar, Understanding ddos attack & its effect in cloud environment. Procedia Comput. Sci. 49, 202–210 (2015)CrossRef
6.
7.
Zurück zum Zitat J. Graham-Cumming, Understanding and mitigating ntp-based ddos attacks, vol. 9 (Cloudflare Inc, California, 2014) J. Graham-Cumming, Understanding and mitigating ntp-based ddos attacks, vol. 9 (Cloudflare Inc, California, 2014)
8.
Zurück zum Zitat M. Prince, Technical details behind a 400gbps ntp amplification ddos attack, vol. 13 (Cloudflare Inc, California, 2014) M. Prince, Technical details behind a 400gbps ntp amplification ddos attack, vol. 13 (Cloudflare Inc, California, 2014)
9.
Zurück zum Zitat N. Gruschka, M. Jensen, Attack surfaces: a taxonomy for attacks on cloud services, in Proceedings of the IEEE 3rd International Conference on Cloud Computing, 2010, pp. 276–279 N. Gruschka, M. Jensen, Attack surfaces: a taxonomy for attacks on cloud services, in Proceedings of the IEEE 3rd International Conference on Cloud Computing, 2010, pp. 276–279
14.
Zurück zum Zitat J. Hong, The state of phishing attacks. Commun. ACM 55(1), 74–81 (2012)CrossRef J. Hong, The state of phishing attacks. Commun. ACM 55(1), 74–81 (2012)CrossRef
16.
Zurück zum Zitat A. Logic, Cloud security report-spring 2014, 2014 A. Logic, Cloud security report-spring 2014, 2014
17.
Zurück zum Zitat J.-M. Brook, R. Brooks, A decade of lessons learned: Transforming the enterprise for todays cloud architecture, in Proceedings of the ICCSM2015 3rd International Conference on Cloud Security and Management: ICCSM2015, Academic Conferences and publishing limited, 2015, p. 16 J.-M. Brook, R. Brooks, A decade of lessons learned: Transforming the enterprise for todays cloud architecture, in Proceedings of the ICCSM2015 3rd International Conference on Cloud Security and Management: ICCSM2015, Academic Conferences and publishing limited, 2015, p. 16
19.
Zurück zum Zitat M.S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, B. Sunar, Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud (Technical report, IACR Cryptology ePrint Archive, 2015) M.S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, B. Sunar, Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud (Technical report, IACR Cryptology ePrint Archive, 2015)
20.
Zurück zum Zitat N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni et al., Drown: Breaking tls using sslv2 N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni et al., Drown: Breaking tls using sslv2
Metadaten
Titel
About Cloud Security
verfasst von
Mohammed M. Alani
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-41411-9_2