Skip to main content
Top

2013 | OriginalPaper | Chapter

4. Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing

Authors : Isabel Del C. Leguías Ayala, Manuel Vega, Miguel Vargas-Lombardo

Published in: Innovations and Advances in Computer, Information, Systems Sciences, and Engineering

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays Cloud Computing provides anew paradigm to organizations, offering advantages, not only for its speed but also for the opportunity of save costs when implementing new applications, by just paying for the resources you use. This article identifies the threats, risks and attacks, also identifies their causes, in addition, proposed solutions from the National Institute of Standards Organization and Technology (NIST) and Cloud Security Alliance (CSA) are also mentioned here.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and solutions. Paper presented at the 7th international conference on informatics and systems (INFOS), pp 1–8 Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and solutions. Paper presented at the 7th international conference on informatics and systems (INFOS), pp 1–8
2.
go back to reference Zhao Y, Foster I, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Grid computing environments workshop (GCE'08), pp 1–10 Zhao Y, Foster I, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Grid computing environments workshop (GCE'08), pp 1–10
3.
go back to reference W. J. (2011) Guidelines on security and privacy in public cloud computing. NIST J 1–60 W. J. (2011) Guidelines on security and privacy in public cloud computing. NIST J 1–60
4.
go back to reference Grance T, Mell P (2009) Definition of cloud computing. NIST J 1–7 Grance T, Mell P (2009) Definition of cloud computing. NIST J 1–7
5.
go back to reference Cloud Security Alliance (2009) Security guidance for critical areas of focus in cloud computing V2.1. J Ala Acad Sci 76 Cloud Security Alliance (2009) Security guidance for critical areas of focus in cloud computing V2.1. J Ala Acad Sci 76
6.
go back to reference Khajeh-Hosseini A, Sriram I (2010) Research agenda in cloud technologies. Technical Report. Khajeh-Hosseini A, Sriram I (2010) Research agenda in cloud technologies. Technical Report.
7.
go back to reference Schubert L, Jeffery K, Neidecker-Lutz B (2010) The future of cloud computing opportunities for European cloud computing beyond 2010. ACC 2011, Part IV, pp 1–71 Schubert L, Jeffery K, Neidecker-Lutz B (2010) The future of cloud computing opportunities for European cloud computing beyond 2010. ACC 2011, Part IV, pp 1–71
8.
go back to reference Creese S, Goldsmith M, Auty M, Hopkin P (2010) Inadequacies of current risk controls for the cloud. In: 2nd IEEE international conference on cloud computing technology and science, pp 659–666 Creese S, Goldsmith M, Auty M, Hopkin P (2010) Inadequacies of current risk controls for the cloud. In: 2nd IEEE international conference on cloud computing technology and science, pp 659–666
9.
go back to reference Chen Z, Yang J (2010) Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 1–3 Chen Z, Yang J (2010) Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 1–3
10.
go back to reference Marinos A, Briscoe G (2009) Community cloud computing. First international conference on cloud computing. pp 1–12 Marinos A, Briscoe G (2009) Community cloud computing. First international conference on cloud computing. pp 1–12
11.
go back to reference Souppaya M, Scarfone K, Hoffman P (2010) Guide to security for full virtualization. Recommendation of the national institute of standards and technology (NIST), pp 1–35 Souppaya M, Scarfone K, Hoffman P (2010) Guide to security for full virtualization. Recommendation of the national institute of standards and technology (NIST), pp 1–35
12.
go back to reference Kong J (2010) A practical approach to improve the data privacy of virtual machines. 10th IEEE international conference on computer and information technology (CIT 2010). pp 936–941 Kong J (2010) A practical approach to improve the data privacy of virtual machines. 10th IEEE international conference on computer and information technology (CIT 2010). pp 936–941
13.
go back to reference Payal S, Amarnath J, Rajeev N, Ravi P (2010) Security in muiti-tenancy cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 4–7 Payal S, Amarnath J, Rajeev N, Ravi P (2010) Security in muiti-tenancy cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 4–7
14.
go back to reference Liu DQ, Srinivasamurthy S (2010) Survey on cloud computing security. In: 2nd IEEE international conference on cloud computing technology and science. pp 8–12 Liu DQ, Srinivasamurthy S (2010) Survey on cloud computing security. In: 2nd IEEE international conference on cloud computing technology and science. pp 8–12
15.
go back to reference Cloud Security Alliance (2010) Top threats to cloud computing V1.0. J Ala Acad Sci 14–16 Cloud Security Alliance (2010) Top threats to cloud computing V1.0. J Ala Acad Sci 14–16
16.
go back to reference INTECO (2011) Riesgos y amenazas en cloud computing. pp 1–32 INTECO (2011) Riesgos y amenazas en cloud computing. pp 1–32
17.
go back to reference Gartner (2008) Assessing the security risk of cloud computing. Gartner (2008) Assessing the security risk of cloud computing.
19.
go back to reference Gregg M (2009) 10 security concerns for cloud computing. Global Knowledge. pp 1–7 Gregg M (2009) 10 security concerns for cloud computing. Global Knowledge. pp 1–7
20.
go back to reference Centre for the protection of national infrastructure (CPNI) (2010) Information security briefing cloud computing. 203.128.31.71/articles/9New7IBHp4z.pdf Centre for the protection of national infrastructure (CPNI) (2010) Information security briefing cloud computing. 203.128.31.71/articles/9New7IBHp4z.pdf
21.
go back to reference Amardeep S, Vem E (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302 Amardeep S, Vem E (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302
22.
go back to reference Vrbsky SV, Zunnurhain K (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science. pp 1–4 Vrbsky SV, Zunnurhain K (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science. pp 1–4
23.
go back to reference Jansen WA (2011) Cloud hook: security and privacy issues in cloud computing. 44th Hawaii international conference on system sciences. pp 1–10 Jansen WA (2011) Cloud hook: security and privacy issues in cloud computing. 44th Hawaii international conference on system sciences. pp 1–10
24.
go back to reference Amardeep Singh Er. VEM (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302 Amardeep Singh Er. VEM (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302
25.
go back to reference Nube computacional. Autoridad de Innovación Gubernamental de Panamá Nube computacional. Autoridad de Innovación Gubernamental de Panamá
26.
go back to reference Gaceta Oficial, República de Panamá, Ministerio de la Presidencia, Decreto Ejecutivo No. 709 Gaceta Oficial, República de Panamá, Ministerio de la Presidencia, Decreto Ejecutivo No. 709
27.
go back to reference ENISA (2011) Seguridad y resistencia en las nubes de la Administración Pública. pp 1–135 ENISA (2011) Seguridad y resistencia en las nubes de la Administración Pública. pp 1–135
Metadata
Title
Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing
Authors
Isabel Del C. Leguías Ayala
Manuel Vega
Miguel Vargas-Lombardo
Copyright Year
2013
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-3535-8_4