DOI QR코드

DOI QR Code

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma (Taif University, College of Computers and Information Technology) ;
  • Al khathami, Jamilah (Taif University, College of Computers and Information Technology) ;
  • Alhakami, Wajdi (Taif University, College of Computers and Information Technology)
  • 투고 : 2021.01.05
  • 발행 : 2021.01.30

초록

The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

키워드

참고문헌

  1. Leila, B., Abdelhafid, Z., & Mahieddine, D. (2017, April). New framework model to secure Cloud data storage. In Computer Science On-line Conference (pp. 44-52). Springer, Cham.
  2. Jin, C., Gohil, V., Karri, R., & Rajendran, J. (2020). Security of Cloud FPGAs: A Survey. arXiv preprint arXiv:2005.04867.
  3. Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209. https://doi.org/10.1016/j.procs.2015.04.171
  4. Kacha, L., & Zitouni, A. (2017, September). An overview on data security in cloud computing. In Proceedings of the Computational Methods in Systems and Software (pp. 250-261). Springer, Cham.
  5. Benabied, S., Zitouni, A., & Djoudi, M. (2015, June). A cloud security framework based on trust model and mobile agent. In 2015 International Conference on Cloud Technologies and Applications (CloudTech) (pp. 1-8). IEEE.
  6. Mathariya, S. Implementation of security architecture in Cloud computing using ECC and BLOWFISH algorithm.
  7. Dheyab, O. A., Turki, A. I., & Rahmatullah, B. (2018). Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq. The Journal of Social Sciences Research, 599-606. https://doi.org/10.32861/jssr.spi6.599.606
  8. Jamil, D., & Zaki, H. (2011). Security issues in cloud computing and countermeasures. International Journal of Engineering Science and Technology (IJEST), 3(4), 2672-2676.
  9. Abdul-Jabbar, S. S., Aldujaili, A., Mohammed, S. G., & Saeed, H. S. (2020). Integrity and Security in Cloud Computing Environment: A Review. Journal of Southwest Jiaotong University, 55(1)
  10. De Donno, M., Giaretta, A., Dragoni, N., Bucchiarone, A., & Mazzara, M. (2019). Cyber-storms come from clouds: Security of cloud computing in the IoT era. Future Internet, 11(6), 127. https://doi.org/10.3390/fi11060127
  11. Qi, Q., & Tao, F. (2019). A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access, 7, 86769-86777. https://doi.org/10.1109/ACCESS.2019.2923610
  12. Kaur, R., & Kinger, S. (2014). Analysis of security algorithms in cloud computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3(3), 171-176.
  13. Singh, J. (2014). Cyber-attacks in cloud computing: A case study. International Journal of Electronics and Information Engineering, 1(2), 78-87.
  14. Vaquero, L. M., Rodero-Merino, L., & Moran, D. (2011). Locking the sky: a survey on IaaS cloud security. Computing, 91(1), 93-118. https://doi.org/10.1007/s00607-010-0140-x
  15. Venkatraman, K., & Geetha, K. (2019). Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm. Automatika, 60(3), 314-321. https://doi.org/10.1080/00051144.2019.1624409
  16. Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January). Cloud security ecosystem for data security and privacy. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292). IEEE.
  17. Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January). Cloud security ecosystem for data security and privacy. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292). IEEE.
  18. Alam, T. (2020). Internet of Things: A Secure Cloud-based MANET Mobility Model. IJ Network Security, 22(3), 514-520.
  19. Cloud security and compliance - A semantic approach in end to end securityArticle in International Journal on Smart Sensing and Intelligent Systems.September 2017 DOI: 10.21307/ijssis-2017-265.
  20. Mesbahi, M. R., Rahmani, A. M., & Hosseinzadeh, M. (2018). Reliability and high availability in cloud computing environments: a reference roadmap. Human-centric Computing and Information Sciences, 8(1), 20. https://doi.org/10.1186/s13673-018-0143-8
  21. Yang, H., & Kim, Y. (2019). Design and Implementation of High-Availability Architecture for IoT-Cloud Services. Sensors, 19(15), 3276. https://doi.org/10.3390/s19153276
  22. Rayan, A., Alhazemi, F., Alshammari, H., & Nah, Y. (2020). Developing Cloud Computing Time Slot-availability Predictions Using an Artificial Neural Network. IEIE Transactions on Smart Processing & Computing, 9(1), 49-57. https://doi.org/10.5573/ieiespc.2020.9.1.049
  23. Mishra, P., Pilli, E. S., Varadharajan, V., & Tupakula, U. (2017). Intrusion detection techniques in cloud environment: A survey. Journal of Network and Computer Applications, 77, 18-47. https://doi.org/10.1016/j.jnca.2016.10.015
  24. Zekri, M., El Kafhali, S., Aboutabit, N., & Saadi, Y. (2017, October). DDoS attack detection using machine learning techniques in cloud computing environments. In 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (pp. 1-7). IEEE.
  25. Alhenaki, L., Alwatban, A., Alamri, B., & Alarifi, N. (2019, May). A survey on the security of cloud computing. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-7). IEEE.
  26. Chand, K. S., & Rani, B. K. (2018). Biometric Authentication using SaaS in Cloud Computing. International Research Journal of Engineering and Technology (IRJET), 5(2).
  27. Shunmugapriya, B., & Paramasivan, B. Protection Against SQL Injection Attack in Cloud Computing.
  28. Patel, R. V., Bhoi, D., & Pawar, C. S. (2020). Security Hazards, Attacks and Its Prevention Techniques in Cloud Computing: A Detail Review.
  29. Abusaimeh, H. (2020). Security Attacks in Cloud Computing and Corresponding Defending Mechanisims. International Journal of Advanced Trends in Computer Science and Engineering, 9(3).
  30. Desarkar, A., & Das, A. (2019). Encryption Algorithm for Data Security in Cloud Computing. Security Designs for the Cloud, Iot, and Social Networking, 1-18.
  31. Alhenaki, L., Alwatban, A., Alahmri, B., & Alarifi, N. (2019). Security in cloud computing: a survey. International Journal of Computer Science and Information Security (IJCSIS), 17(4).