PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Survey on cloud computing vulnerability and cyber attacks: a defensive approach

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing. There are security risks and they should be considered carefully before enterprises migrate to cloud computing. Specifying cloud computing vulnerabilities and defining cyber attacks against infrastructure of the Cloud are the targets of this research. Mitigation of the non-technical problems may decrease the security problems. However, cryptographies, distributed denial of service and flooding attacks damage the servers and services. In this research, my aim is to demonstrate cloud computing vulnerability and the threats against data and storage. Once the cloud security problems are defined, the next step is to look for a solution. Using forensic methods to inspect intrusion attempts, implementing an online forensic workstation monitoring the login details of cloud authentication server, providing evidence of cyber crime are recommended.
Słowa kluczowe
Rocznik
Strony
95--107
Opis fizyczny
Bibliogr. 12 poz., rys., tab.
Twórcy
autor
  • Polish Japanese Institute of Information Technology
Bibliografia
  • [1] 2009 Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance (CSA), http://www.diceitwise.com/what-is-iaas-paas-saas
  • [2] Asma A, Chaurasia M A and Mokhtar H 2012 Int. J. Application or Innovation in Engineering & Management 1 (2) 141
  • [3] https://en.wikipedia.org/wiki/Hypervisor
  • [4] Praunhofer SIT 2012 Cloud Computing: Same Weakness Found in Seven Cloud Storage Services, Science Daily, http://www.sciencedaily.com/releases/2012/06/120629142416.htm June29
  • [5] Chen L, Liu B, Hu H and Zheng Q 2012 Proc.11th Int. Conf. on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Liverpool, England, pp.1259-1264
  • [6] USA Government Report 2013 Data Security: Top Threats to Data Protection, Assistance Center: http://nces.ed.gov/ptac
  • [7] CSA Security Report 2013 Top Nine Cloud Security Threats in 2013, Cloud Security Alliance
  • [8] Sheider B 1996 Applied Cryptography, Protocol. Algorithms and Source Code in C, 2nd Ed., John Wiley & Sons
  • [9] Alomari E and Karuppayah S 2012 Int. J. Comput. Appl. 49 (7) 24
  • [10] http://www.pc-history.org/forensics.htrn
  • [11] 2013 Mapping the Forensics Standard ISO/IEC 27037 to Cloud Computing, Cloud Security Alliance (CSA), June
  • [12] ISO 27037, Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence, http://www.iso.org/iso/catalogue_detail.?csnumber=44381
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-9d34db0d-d296-4673-a9c4-bf75dd76e976
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.