Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Classification of Attaks over Cloud Environment
Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed Eladnani Fatiha, Benihssane Abderahim
Abstract:
The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.Keywords: Cloud computing, security, classification, risk.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1107307
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2082References:
[1] Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing EnvironmentsWorkshop, pp. 1–10. IEEE (2008). DOI:10.1109/GCE.2008.4738445.
[2] Viega, J.: Cloud computing and the common man. Computer 42(8), 106–108 (2009). doi:10.1109/MC.2009.252.
[3] NIST: NIST Cloud Computing Program. http://www.nist.gov/itl/ cloud/ (2012). Accessed Sept. 2012.
[4] Banerjee, P., Friedrich, R., Bash, C., Goldsack, P., Huberman, B.,Manley, J., Patel, C., Ranganathan, P., Veitch, A.: Everything as aservice: powering the newinformation economy. Computer 44(3),36– 43 (2011). doi:10.1109/MC.2011.67.
[5] Boampong, P.A., Wahsheh, L.A.: Different facets of security in the cloud. In: Proceedings of the 15th Communications and Networking Simulation Symposium, pp. 5:1–5:7. Society for Computer Simulation International, San Diego, CA, USA (2012).
[6] Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: 39th International Conference on Parallel ProcessingWorkshop, pp. 275–279. IEEE Computer Society, Washington, DC, USA (2010). doi:10.1109/ICPPW.2010.45.
[7] Khorshed,M.T., Ali, A.S.,Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012). doi:10.1016/j.future.2012.01.006.
[8] Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 23–31. IEEE Computer Society, Washington, DC, USA (2009). doi:10.1109/CLOUD. 2009.5071529.
[9] Patidar, S., Rane, D., Jain, P.: A survey paper on cloud computing. In: 2nd International Conference on Advanced Computing Communication Technologies, pp. 394–398. IEEE (2012). doi:10. 1109/ACCT.2012.15.
[10] Sadashiv, N., Kumar, S.: Cluster, grid and cloud computing: a detailed comparison. In: 6th International Conference on Computer Science Education, pp. 477–482. IEEE (2011). doi:10.1109/ ICCSE.2011.6028683.
[11] Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appli. 34(1), 1– 11 (2011). doi:10.1016/j.jnca.2010.07.006.
[12] Xiao, Z., Xiao,Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tuts. 15(2), 843–859 (2013). doi:10.1109/SURV. 2012.060912.00182.
[13] Aguiar, E., Zhang, Y., Blanton, M.: An Overview of Issues andRecent Developments in Cloud Computing and Storage Security, pp. 1–31. Springer, Berlin (2013).
[14] Boampong, P.A., Wahsheh, L.A.: Different facets of security inthe cloud. In: Proceedings of the 15th Communications and Networking Simulation Symposium, pp. 5:1–5:7. Society for Computer Simulation International, San Diego, CA, USA (2012).
[15] Gul, I., Rehman, A., Islam, M.: Cloud computing security auditing.In: The 2nd International Conference on Next Generation Information Technology, pp. 143–148. IEEE (2011).
[16] Mohamed, E., Abdelkader, H., El-Etriby, S.: Enhanced data security model for cloud computing. In: 8th International Conference on Informatics and Systems, pp. CC-12–CC-17. IEEE (2012).
[17] Ramgovind, S., Eloff, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, pp. 1–7. IEEE (2010). doi:10.1109/ISSA.2010.5588290.
[18] Sabahi, F.: Cloud computing security threats and responses. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 245–249. IEEE (2011). doi:10.1109/ICCSN. 2011.6014715.
[19] Songjie, Yao, J.,Wu, C.: Cloud computing and its key techniques. In: International Conference on Electronic and Mechanical Engineering and Information Technology, vol. 1, pp. 320–324. IEEE (2011).doi:10.1109/EMEIT.2011.6022935.
[20] Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appli. 34(1), 1– 11 (2011). doi:10.1016/j.jnca.2010.07.006.
[21] Yang, J., Chen, Z.: Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering, pp. 1–3. IEEE (2010). doi:10.1109/CISE. 2010.5677076.
[22] Enterprise Risk Management-Integrated Framework Executif Summary September 2004.Pdf
[23] H.J. Pasman, S. Jung, K. Prem, W.J. Rogers, X. Yang. Is Risk Analysis A Useful Tool For Improving Process Safety?. Journal Of Loss Prevention In The Process Industries 22 (2009) P. 769–777.
[24] P.K. Marhavilasa, D. Koulouriotisb, V.Gemenib. Risk Analysis And Assessment Methodologies In The Work Sites: On A Review, Classification And Comparative Study Of The Scientific Literature Of The Period 2000–2009. Journal Of Loss Prevention In The Process Industries Volume 24, Issue 5, September 2011, Pages 477–523.
[25] Ronald L. Krutz And Russell Dean Vines, Cloud Security. A Comprehensive Guide To Secure Cloud Computing.
[26] J.Heiser And Mark Nicolett: “Assessing The Security Risks Of Cloud Computing.” Gartner, 3 June 2008
[27] Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 5.
[28] Peter Mell, Timothy Grance “The NIST Definition of Cloud Computing Special Publication 800-142”