Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.1.23

SECURITY THREATS AND ATTACKS IN CLOUD  

Mohammed, Asma (Taif University, College of Computers and Information Technology)
Al khathami, Jamilah (Taif University, College of Computers and Information Technology)
Alhakami, Wajdi (Taif University, College of Computers and Information Technology)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.1, 2021 , pp. 184-191 More about this Journal
Abstract
The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.
Keywords
Cloud Computing; Security; Attacks; Threats;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cloud security and compliance - A semantic approach in end to end securityArticle in International Journal on Smart Sensing and Intelligent Systems.September 2017 DOI: 10.21307/ijssis-2017-265.   DOI
2 Yang, H., & Kim, Y. (2019). Design and Implementation of High-Availability Architecture for IoT-Cloud Services. Sensors, 19(15), 3276.   DOI
3 Rayan, A., Alhazemi, F., Alshammari, H., & Nah, Y. (2020). Developing Cloud Computing Time Slot-availability Predictions Using an Artificial Neural Network. IEIE Transactions on Smart Processing & Computing, 9(1), 49-57.   DOI
4 Alhenaki, L., Alwatban, A., Alamri, B., & Alarifi, N. (2019, May). A survey on the security of cloud computing. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-7). IEEE.
5 Shunmugapriya, B., & Paramasivan, B. Protection Against SQL Injection Attack in Cloud Computing.
6 Patel, R. V., Bhoi, D., & Pawar, C. S. (2020). Security Hazards, Attacks and Its Prevention Techniques in Cloud Computing: A Detail Review.
7 Desarkar, A., & Das, A. (2019). Encryption Algorithm for Data Security in Cloud Computing. Security Designs for the Cloud, Iot, and Social Networking, 1-18.
8 Alhenaki, L., Alwatban, A., Alahmri, B., & Alarifi, N. (2019). Security in cloud computing: a survey. International Journal of Computer Science and Information Security (IJCSIS), 17(4).
9 Zekri, M., El Kafhali, S., Aboutabit, N., & Saadi, Y. (2017, October). DDoS attack detection using machine learning techniques in cloud computing environments. In 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech) (pp. 1-7). IEEE.
10 Mathariya, S. Implementation of security architecture in Cloud computing using ECC and BLOWFISH algorithm.
11 Singh, J. (2014). Cyber-attacks in cloud computing: A case study. International Journal of Electronics and Information Engineering, 1(2), 78-87.
12 Leila, B., Abdelhafid, Z., & Mahieddine, D. (2017, April). New framework model to secure Cloud data storage. In Computer Science On-line Conference (pp. 44-52). Springer, Cham.
13 Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.   DOI
14 Kacha, L., & Zitouni, A. (2017, September). An overview on data security in cloud computing. In Proceedings of the Computational Methods in Systems and Software (pp. 250-261). Springer, Cham.
15 Abdul-Jabbar, S. S., Aldujaili, A., Mohammed, S. G., & Saeed, H. S. (2020). Integrity and Security in Cloud Computing Environment: A Review. Journal of Southwest Jiaotong University, 55(1)
16 De Donno, M., Giaretta, A., Dragoni, N., Bucchiarone, A., & Mazzara, M. (2019). Cyber-storms come from clouds: Security of cloud computing in the IoT era. Future Internet, 11(6), 127.   DOI
17 Kaur, R., & Kinger, S. (2014). Analysis of security algorithms in cloud computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3(3), 171-176.
18 Venkatraman, K., & Geetha, K. (2019). Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm. Automatika, 60(3), 314-321.   DOI
19 Alam, T. (2020). Internet of Things: A Secure Cloud-based MANET Mobility Model. IJ Network Security, 22(3), 514-520.
20 Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January). Cloud security ecosystem for data security and privacy. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292). IEEE.
21 Dheyab, O. A., Turki, A. I., & Rahmatullah, B. (2018). Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq. The Journal of Social Sciences Research, 599-606.   DOI
22 Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017, January). Cloud security ecosystem for data security and privacy. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence (pp. 288-292). IEEE.
23 Mesbahi, M. R., Rahmani, A. M., & Hosseinzadeh, M. (2018). Reliability and high availability in cloud computing environments: a reference roadmap. Human-centric Computing and Information Sciences, 8(1), 20.   DOI
24 Mishra, P., Pilli, E. S., Varadharajan, V., & Tupakula, U. (2017). Intrusion detection techniques in cloud environment: A survey. Journal of Network and Computer Applications, 77, 18-47.   DOI
25 Chand, K. S., & Rani, B. K. (2018). Biometric Authentication using SaaS in Cloud Computing. International Research Journal of Engineering and Technology (IRJET), 5(2).
26 Abusaimeh, H. (2020). Security Attacks in Cloud Computing and Corresponding Defending Mechanisims. International Journal of Advanced Trends in Computer Science and Engineering, 9(3).
27 Jin, C., Gohil, V., Karri, R., & Rajendran, J. (2020). Security of Cloud FPGAs: A Survey. arXiv preprint arXiv:2005.04867.
28 Benabied, S., Zitouni, A., & Djoudi, M. (2015, June). A cloud security framework based on trust model and mobile agent. In 2015 International Conference on Cloud Technologies and Applications (CloudTech) (pp. 1-8). IEEE.
29 Jamil, D., & Zaki, H. (2011). Security issues in cloud computing and countermeasures. International Journal of Engineering Science and Technology (IJEST), 3(4), 2672-2676.
30 Qi, Q., & Tao, F. (2019). A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access, 7, 86769-86777.   DOI
31 Vaquero, L. M., Rodero-Merino, L., & Moran, D. (2011). Locking the sky: a survey on IaaS cloud security. Computing, 91(1), 93-118.   DOI