Detail Study of Cloud Infrastructure Attacks and Security Techniques

Authors

  • Singh B G Surendranath Research Scholar, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India. Author
  • Sunil Phulre Associate Professor, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India. Author

Keywords:

Cloud Computing, Multi-tenant, Trust Computing, Resource Management

Abstract

 Cloud computing is Internet-based computing  and the next stage in the evolution of the internet. The uses of  the cloud attract different industries in the recent decade, but  this brings security challenges against attacks from insider or  outsider, human or bot. Many researchers are working  continuously to resolve the issues by introducing policies,  algorithms for accessing and storage of client data. This paper  gives a detailed survey on IAAS security issues. A virtual  machine should be secured to handle data and maintain  privacy. Methods proposed by various scholars are explained  which directly or indirectly enhance the security of the cloud.  Tenant-based measures were also in the solutions to various  issues. Paper has listed some of the trust techniques developed  by researchers for identifying any malicious machine. 

Downloads

Download data is not yet available.

References

Manoj, K., Manglem, S. “CBMIR: Content based medical image retrieval system using texture and intensity for eye images”. International Journal of Scientific & Engineering Research, 2016.

J. Heiser, and M. Nicolett, Accessing the Security Risks of Cloud Computing, G00157782, Gartner, Inc., Stamford, CT, 2008.

M. Armbrust, A. Fox, It Griffith, et al., Above the Clouds: A Berkeley View of Cloud Computing, University of California Berkeley, Berkeley, CA, 2009.

Zhang, Y. & Joshi, J. (2009). Access Control and Trust Management for Emerging Multidomain Environments. Annals of Emerging Research in Information Assurance, Security and

Privacy Services, S. Upadhyay and R.O. Rao (eds.), Emerald Group Publishing, pp. 421-452, 2009.

Tingwei Chen, China Jing Lei. “Research on Service Reputation Evaluation Method Based on Cloud Model”. International Journal of Intelligent Information Systems Volume 4, Issue 1, February 2015, Pages: 8-15.

I. Odun-Ayo, M. Ananya, F. Agono and R. Goddy-Worlu, "Cloud Computing Architecture: A Critical Analysis," 2018 18th International Conference on Computational Science and Applications (ICCSA), Melbourne, VIC, 2018.

S. Campbell, and M. Jeronimo, Applied Virtualization Technology, Hillsboro, OR: Intel Press, 2006.

D. Nurmi, R. Wolski, C. Grzegorczyk, et aL, Eucalyptus: A Technical Report on an Elastic Utility Computing Architecture Linking Your Programs to Useful Systems, Technical Report 2008-10, University of California Santa Barbara Computer Science, Santa Barbara, CA, 2008.

"Amazon Elastic Compute Cloud (Amazon EC2)," http://aws.amazon.com/ec2/.

Azad M.A., Bag S., Hao F., Salah K. M2m-rep: Reputation system for machines in the internet of things. Comput. Secur. 2018.

Rafey S.E.A., Abdel-Hamid A., El-Nasr M.A. CBSTM-IoT: Context-based social trust model for the Internet of Things; Proceedings of the 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT); Cairo, Egypt. 11–13 April 2016; pp. 1–8.

Chen Z., Ling R., Huang C.M., Zhu X. A scheme of access service recommendation for the Social Internet of Things. Int. J. Commun. Syst. 2016.

Peiyun Zhang, Senior Member, IEEE, Yang Kong, And Mengchu Zhou. “A Domain Partition-Based Trust Model For Unreliable Clouds”. IEEE Transactions On Information Forensics And Security, VOL. 13, NO. 9, SEPTEMBER 2018.

T. F. J.-M. Pasquier, J. Singh, D. Eyers, and J. Bacon, ``Cam_ow: Managed data-sharing for cloud services,'' IEEE Trans. Cloud Comput., vol. 5, no. 3, pp. 472_484, Jul. 2017.

Z. Wu, X.-Y. Chen, and X.-H. Du, ``Enhancing sensitive data security based-on double-layer information _ow controlling in the cloud,'' Acta Electron. Sinica, vol. 46, no. 9, pp. 2245_2250, Sep. 2018.

N. E. Moussaid and M. E. Azhari, ``Enhance the security properties and information _ow control,'' Int. J. Electron. Bus., vol. 15, no. 3, pp. 249_274, 2020.

X. Lu, L. Cao, and X. Du, ``Dynamic control method for tenants' sensitive information _ow based on virtual boundary recognition,'' IEEE Access, vol. 8, pp. 162548_162568, 2020.

Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, and Azzam Mourad. “Optimal Load Distribution for the Detection of VM based DDoS Attacks in the Cloud”. IEEE Transaction, Services Computing Nov. 2020.

B. Hari Krishna, S. Kiran, G. Murali, R. Pradeep Kumar Reddy. "Security Issues in Service Model of Cloud Computing Environment". Procedia Computer Science, Volume 87, 2016.

Security and Security andPrivacy Privacy Privacy Issues in Cloud Computing Computing Jaydip Sen Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA.

J. Li, N. Li, and W. H. Winsborough, “Automated trust negotiation using cryptographic credentials,” in Proc. ACM Conf. Computer and Communications Security (CCS), Alexandria, VA, 2005.

V. Goyal, O. Pandey, A. Sahai, and B.Waters, “Attibute-based encryption for fine-grained access control of encrypted data,” in

Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006.

D. Grawrock, Dynamics of a Trusted Platform, Hillsboro, OR: Intel Press, 2009.

Published

2021-03-30

How to Cite

Detail Study of Cloud Infrastructure Attacks and Security Techniques. (2021). International Journal of Innovative Research in Computer Science & Technology, 9(2), 21–27. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11562