Skip to main content
Top

2016 | OriginalPaper | Chapter

2. About Cloud Security

Author : Mohammed M. Alani

Published in: Elements of Cloud Computing Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter starts by discussing how cloud computing security is different from classical network security. The chapter mentions some threats and attacks that apply specifically to cloud computing. The chapter elaborates on most recent real-life attacks to cloud computing in the past few years. The chapter also explains the history of Denial of Service attacks along with other attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference R. Shirey, Rfc 2828: Internet security glossary, in The Internet Society (2000), p. 13 R. Shirey, Rfc 2828: Internet security glossary, in The Internet Society (2000), p. 13
2.
go back to reference W. Stallings, Cryptography and Network Security, 4/E (Pearson Education, Upper Saddle River, 2006) W. Stallings, Cryptography and Network Security, 4/E (Pearson Education, Upper Saddle River, 2006)
3.
go back to reference J. Idziorek, M. Tannian, D. Jacobson, Attribution of fraudulent resource consumption in the cloud, in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD), 2012, pp. 99–106 J. Idziorek, M. Tannian, D. Jacobson, Attribution of fraudulent resource consumption in the cloud, in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD), 2012, pp. 99–106
4.
go back to reference M.M. Alani, Manet security: a survey, in Proceedings of the IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2014, pp. 559–564 M.M. Alani, Manet security: a survey, in Proceedings of the IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2014, pp. 559–564
5.
go back to reference R.V. Deshmukh, K.K. Devadkar, Understanding ddos attack & its effect in cloud environment. Procedia Comput. Sci. 49, 202–210 (2015)CrossRef R.V. Deshmukh, K.K. Devadkar, Understanding ddos attack & its effect in cloud environment. Procedia Comput. Sci. 49, 202–210 (2015)CrossRef
6.
7.
go back to reference J. Graham-Cumming, Understanding and mitigating ntp-based ddos attacks, vol. 9 (Cloudflare Inc, California, 2014) J. Graham-Cumming, Understanding and mitigating ntp-based ddos attacks, vol. 9 (Cloudflare Inc, California, 2014)
8.
go back to reference M. Prince, Technical details behind a 400gbps ntp amplification ddos attack, vol. 13 (Cloudflare Inc, California, 2014) M. Prince, Technical details behind a 400gbps ntp amplification ddos attack, vol. 13 (Cloudflare Inc, California, 2014)
9.
go back to reference N. Gruschka, M. Jensen, Attack surfaces: a taxonomy for attacks on cloud services, in Proceedings of the IEEE 3rd International Conference on Cloud Computing, 2010, pp. 276–279 N. Gruschka, M. Jensen, Attack surfaces: a taxonomy for attacks on cloud services, in Proceedings of the IEEE 3rd International Conference on Cloud Computing, 2010, pp. 276–279
14.
16.
go back to reference A. Logic, Cloud security report-spring 2014, 2014 A. Logic, Cloud security report-spring 2014, 2014
17.
go back to reference J.-M. Brook, R. Brooks, A decade of lessons learned: Transforming the enterprise for todays cloud architecture, in Proceedings of the ICCSM2015 3rd International Conference on Cloud Security and Management: ICCSM2015, Academic Conferences and publishing limited, 2015, p. 16 J.-M. Brook, R. Brooks, A decade of lessons learned: Transforming the enterprise for todays cloud architecture, in Proceedings of the ICCSM2015 3rd International Conference on Cloud Security and Management: ICCSM2015, Academic Conferences and publishing limited, 2015, p. 16
19.
go back to reference M.S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, B. Sunar, Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud (Technical report, IACR Cryptology ePrint Archive, 2015) M.S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, B. Sunar, Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud (Technical report, IACR Cryptology ePrint Archive, 2015)
20.
go back to reference N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni et al., Drown: Breaking tls using sslv2 N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni et al., Drown: Breaking tls using sslv2
Metadata
Title
About Cloud Security
Author
Mohammed M. Alani
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-41411-9_2

Premium Partner