Cloud Computing Security Threats and Attacks with Their Mitigation Techniques
- 1 October 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 244-251
- https://doi.org/10.1109/cyberc.2017.37
Abstract
Cloud computing is a rapidly growing internet technology for facilitating with various services to its consumers. It proposes many striking promises to the general public or big companies like Amazon, Google, Microsoft, and IBM etc. to maintain and upgrade their position in fast-growing cloud computing environment and to enhance their services for a large number of users. However, with the fast development and enticing offerings, many issues associated with this technology also arises which needs to be addressed with security being the strongest barrier to its adoption. Security concerns are an active area of research, which needs to be addressed properly to avoid security threats and attacks which are disasters for both service providers and service consumers. This paper highlights cloud computing architectural principles, cloud computing key security requirements, cloud computing security threats and cloud computing security attacks with their mitigation techniques, and future research challenges.Keywords
This publication has 16 references indexed in Scilit:
- A survey on detection and mitigation of zombie attacks in cloud environmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Security issues in cloud environments: a surveyInternational Journal of Information Security, 2013
- A survey on security issues and solutions at different layers of Cloud computingThe Journal of Supercomputing, 2012
- Survey on Security Issues in Cloud Computing and Associated Mitigation TechniquesInternational Journal of Computer Applications, 2012
- Addressing cloud computing security issuesFuture Generation Computer Systems, 2012
- Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Virtualization security for cloud computing servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Cloud computing: state-of-the-art and research challengesJournal of Internet Services and Applications, 2010
- XML signature element wrapping attacks and countermeasuresPublished by Association for Computing Machinery (ACM) ,2005
- Malicious sniffing systems detection platformPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004