Skip to main content
Top

2020 | OriginalPaper | Chapter

8. Cloud Computing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is a platform that provides state of the art information technology resources which are cheaper, scalable and easy to manage. But the cloud properties such as high scalability, quick deployment, dynamic resource range, high computing power, high bandwidth, etc. are exploited by cyber criminals as the tools for introducing new cybercrimes. These cybercrimes include DDoS as a service, Botnet as a service, Malware as a service, password cracking, BotClouds, C&C servers, Warez as a service, etc.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abdullah S, Bakar KAA (2018) Security and privacy challenges in cloud computing. In: Cyber resilience conference (CRC) Abdullah S, Bakar KAA (2018) Security and privacy challenges in cloud computing. In: Cyber resilience conference (CRC)
go back to reference Alshammari A, Alhaidari S, Alharbi A, Zohdy M (2017) Security threats and challenges in cloud computing. In: IEEE 4th international conference on cyber security and cloud computing Alshammari A, Alhaidari S, Alharbi A, Zohdy M (2017) Security threats and challenges in cloud computing. In: IEEE 4th international conference on cyber security and cloud computing
go back to reference Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616CrossRef Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616CrossRef
go back to reference Feller E, Rilling L, Morin C (2012) Snoze: a scalable and automatic virtual machine management framework for private clouds. In: Proceedings of CCGrid’12, Ottawa, Canada, pp 482–489 (2012) Feller E, Rilling L, Morin C (2012) Snoze: a scalable and automatic virtual machine management framework for private clouds. In: Proceedings of CCGrid’12, Ottawa, Canada, pp 482–489 (2012)
go back to reference Ganga K, Karthik S (2013) A fault tolerant approach in scientific workflow systems based on cloud computing. In: IEEE international conference on pattern recognition, informatics and medical engineering (PRIME), pp 387–390 Ganga K, Karthik S (2013) A fault tolerant approach in scientific workflow systems based on cloud computing. In: IEEE international conference on pattern recognition, informatics and medical engineering (PRIME), pp 387–390
go back to reference Halabi T, Bellaiche M, Abusitta A (2018) A cooperative game for online cloud federation formation based on security risk assessment. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 83–88 Halabi T, Bellaiche M, Abusitta A (2018) A cooperative game for online cloud federation formation based on security risk assessment. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 83–88
go back to reference Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Open Access J Comput 3:1–35CrossRef Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Open Access J Comput 3:1–35CrossRef
go back to reference Lei M, Vrbsky SV, Hong X (2008) An on-line replication strategy to increase availability in data grids. Future Gener Comput Syst 24(2):85–98CrossRef Lei M, Vrbsky SV, Hong X (2008) An on-line replication strategy to increase availability in data grids. Future Gener Comput Syst 24(2):85–98CrossRef
go back to reference Li J, Humphrey M, Cheah YW, Ryu Y, Agarwal D, Jackson K, van Ingen C (2010) Fault tolerance and scaling in e-Science cloud applications: observations from the continuing development of MODISAzure. In: 6th International Conference on e-Science (e-Science), IEEE, pp 246–253 Li J, Humphrey M, Cheah YW, Ryu Y, Agarwal D, Jackson K, van Ingen C (2010) Fault tolerance and scaling in e-Science cloud applications: observations from the continuing development of MODISAzure. In: 6th International Conference on e-Science (e-Science), IEEE, pp 246–253
go back to reference Marzouk S, Jmaiel M (2011) A survey on software check-pointing and mobility techniques in distributed systems. Concurr Comput 23(11):1196–1212CrossRef Marzouk S, Jmaiel M (2011) A survey on software check-pointing and mobility techniques in distributed systems. Concurr Comput 23(11):1196–1212CrossRef
go back to reference Naik N, Jenkins P (2016) An analysis of open standard identity protocols in cloud computing security paradigm. In: IEEE 14th International conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, with 2nd international conference on big data intelligence and computing and cyber science and technology congress Naik N, Jenkins P (2016) An analysis of open standard identity protocols in cloud computing security paradigm. In: IEEE 14th International conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, with 2nd international conference on big data intelligence and computing and cyber science and technology congress
go back to reference Nie W, Xiao X, Wu Z, Wu Y, Shen F, Luo X (2018) The research of information security for the education cloud platform based on AppScan technology. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom) Nie W, Xiao X, Wu Z, Wu Y, Shen F, Luo X (2018) The research of information security for the education cloud platform based on AppScan technology. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom)
go back to reference Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: International conference on energy, communication, data analytics and soft computing (ICECDS) Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: International conference on energy, communication, data analytics and soft computing (ICECDS)
go back to reference Shvachko K, Kuang H, Radia S, Chansler R (2010) The Hadoop distributed file system. In: Proceedings of 2010 IEEE 26th symposium on mass storage systems and technologies (MSST 2010). IEEE Press, New York, pp 1–10 Shvachko K, Kuang H, Radia S, Chansler R (2010) The Hadoop distributed file system. In: Proceedings of 2010 IEEE 26th symposium on mass storage systems and technologies (MSST 2010). IEEE Press, New York, pp 1–10
go back to reference Vishwanath K, Nagappan N (2010) Characterizing cloud computing hardware reliability. In: Proceeding of SoCC’10, Indianpolis, IN, USA, pp 193–204 Vishwanath K, Nagappan N (2010) Characterizing cloud computing hardware reliability. In: Proceeding of SoCC’10, Indianpolis, IN, USA, pp 193–204
go back to reference Yuan D, Yang Y, Liu X, Chen J (2010) A data placement strategy in scientific cloud workflows. Future Gener Comput Syst 26(8):1200–1214CrossRef Yuan D, Yang Y, Liu X, Chen J (2010) A data placement strategy in scientific cloud workflows. Future Gener Comput Syst 26(8):1200–1214CrossRef
go back to reference Zheng Z, Zhou TC, Lyu MR, King I (2010) FTCloud: a component ranking framework for fault tolerant cloud applications. In IEEE 21st international symposium on software reliability engineering (ISSRE 2010), pp 398–407, Nov 2010 Zheng Z, Zhou TC, Lyu MR, King I (2010) FTCloud: a component ranking framework for fault tolerant cloud applications. In IEEE 21st international symposium on software reliability engineering (ISSRE 2010), pp 398–407, Nov 2010
Metadata
Title
Cloud Computing
Authors
Ramjee Prasad
Vandana Rohokale
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-31703-4_8

Premium Partner