Threats - Solutions in Cloud Security
Threats - Solutions in Cloud Security
Threats - Solutions in Cloud Security
Abstract: Distributed computing frameworks speak to a standout amongst the most complex processing frameworks as of now in presence.
Current uses of Cloud include broad utilization of disseminated frameworks with shifting level of network and use. With a late concentrate on
huge scale expansion of Cloud processing, personality administration in Cloud based frameworks is a basic issue for the maintainability of any
Cloud-based administration. This zone has additionally gotten extensive consideration from the exploration group and also the IT business.
Diverse calculations and methodology are utilized by the specialists. Still distributed computing security is in its center stage. A few IT
organizations are concentrating on cloud security and cloud information security. This paper gives a thought regarding security dangers and
arrangements.
Keywords: Cloud computing, security, attacks, distributed computing
__________________________________________________*****_________________________________________________
Shoulder Surfing Attack This attack results in information disclosure and in a Cloud scenario it can be mitigated
by using secure two factor authentication and out-of band authentication mechanisms.
Cookie Poisoning It can be handled by attaching the hash values of the data stored in the cookies and
recalculating the same at the destination
Replay Attack The integrity of the nonce value send by the legal user can be ensured by attaching the
plain nonce value with the hash of the nonce XORed with the message value.
Session Hijacking A key exchange mechanism, that involves the calculation of session key separately by
the Client and server, resulting in the same key value, can be adopted in a Cloud
environment
Flooding Attack This attack can be controlled by data transfer throttling, fool proof authentication
mechanisms and mechanisms that filter out bogus requests
Browser Attack The web browser has to use SSL/TLS to encrypt the credentials and use SSL/TLS 4-way
handshake process in order to authenticate the client
Weak Authentication : Strong authentication mechanisms such as 2-factor authentication without password
tables are recommended in a Cloud environment
281
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 279 282
_______________________________________________________________________________________________
All these attacks included in the category of password [8] Seo, K.K.: Factor analysis of the cloud service adoption
discovery attacks, focuses on obtaining the passwords of a intension of Korean firms: applying the TAM and VAM. J.
legal user which in turn is used to illegally impersonate the Digit PolicyManag.11(12), 155160 (2013)
[9] Park, C.S.: Study on security considerations in the cloud
user to a verifier. Such attacks will result in a successful
computing. J Korea Acad.-Ind. Co-op. Soc. 12(3), 1408
authentication, if and only if the authentication process is
1416 (2011)
solely based on password. In a Cloud scenario, this can be [10] Siani, P., Azzedine, B.: Privacy, security and trust issues
handled by protecting secrets, avoiding the storage of arising from cloud computing. In: 2nd IEEE International
passwords, Zero Knowledge Proof (ZKP) mechanisms, Conference on Cloud Computing Technology and Science,
privacy enhanced protocols implementing 2-factor pp. 693702 (2010)
authentication mechanisms without password tables [11] Heiser, J., Nicolett, M.: Assessing the Security Risks of
etc.Different attacks and solutions are reviewed in table1. Cloud Computing. Gartner (2008)
[12] Almond, C.: A Practical Guide to Cloud Computing
Security What You Need to Know Now About Your
III. Conclusion
Business and Cloud Security, pp. 627. Avanade Inc.
Distributed computing can be considered as an
(2009)
administration, like the way that power is viewed as an [13] Zissis, D., Lekkas, D.:Addressing cloud computing security
administration in urban territories. A cloud client can use issues. Future Gener. Comput. Syst. 28(3), 583592 (2012)
distinctive processing assets (e.g. system, stockpiling, [14] Foster, T., Zhao,Y., Lu, S.: Cloud computing resource
programming application), at whatever point required, management through a grid middleware: a case study with
without being worried with the complex basic innovation diet and eucalyptus. Cloud computing. In: IEEE
and framework engineering. The most essential component International Conference, pp. 151154(2009). Accessed 25
is that the figuring assets are accessible at whatever point August (2015)
[15] Tarrant, D., Brody, T., Carr, L.: From the desktop to the
they are required. Also, clients pay just for the asset they
cloud: leveraging hybrid storage architectures in your
really utilize. Subsequently, cloud clients can without much
repository. In: International Conference on Open
of a stretch scale their data innovation foundation, taking Repositories. http://eprints.soton.ac.uk/267084/1/or09.pdf
into account their business strategy and prerequisites. This (2009). Accessed 25 August (2015)
adaptability makes the business procedure more agile.This [16] S. Subashini and V. Kavitha, A survey on security issues
paper talks about a few dangers that are connected with the in service delivery models of cloud computing, J. Netw.
cloud security. Comput. Appl., vol. 34, no. 1, pp. 111, 2011.
[17] M. Ali, S. U. Khan, and A. V. Vasilakos, Security in cloud
computing: Opportunities and challenges, Inf. Sci. (Ny).,
References
vol. 305, pp. 357383, 2015.
[1] Ratansingham, P., Kumer, K.: Trading partner trust in
[18] M. Jouini and L. B. A. Rabai, A Security Framework for
electronic commerce participation. In: Proceeding of the
Secure Cloud Computing Environments, Int. J. Cloud
22nd International Conference on Information systems, pp.
Appl. Comput., vol. 6, no. 3, pp. 3244, 2016.
544552 (2000)
[19] B. R. Kandukari, R. Paturi V, and A. Rakshit, Cloud
[2] Kim, K.K., Lee, J.W., Kim, H.S.: Impact of trust and risk
Security Issues, in 2009 Ieee International Conference on
on internet banking adoption. Korean Manag. Rev. 32(6),
Services Computing, 2009, pp.517520.
17711797 (2003)
[20] W. Jansen and T. Grance, Guidelines on Security and
[3] Jarvenpaa, S.L., Knoll, K., Leidner, D.E.: Is anybody out
Privacy in PublicCloud Computing, National Institute of
there? Antecedents of trust in global virtual teams. J.
Standards and Technology Draft (NIST) Draft Special
Manag. Inf. Syst.14(4), 2964 (1998)
Publication 800-144, 2011
[4] Lim, N.: Consumers Perceived Risk: Sources versus
[21] M. A. C. Dekker and L. Dimitra, Cloud Security Guide
Consequences. Electron. Commer. Res. Appl. 2(3), 216
for SMEs, European Union Agency for Network and
228 (2003)
Information Security, 2015.
[5] Ahn, J.H.,Choi,K.C., Sung, K.M., Lee, J.H.:Astudy on the
[22] OWASP Top 10, The Ten Most Critical Web Application
impact of security risk on the usage of knowledge
Security Risks, 2013.
management system: focus on parameter of trust. In:
[23] Venkata Sravan Kumar Maddineni
International Conference on Information systems, vol.15
,ShivashankerRagi.,(2011). Security Techniques for
[6] Hexin, Y., Ahn, J.C.: An empirical analysis on the
Protecting Data in Cloud Computing.
persistent usage of personal cloud service: a cast study of
China. Proc. Korean Soc. Internet Inf. Conf. 15(2), 149
150 (2014)
[7] Jun, C.J., Lee, J.H., Jeon, I.S.: Research about factor
affecting the continuous use of cloud storage service: user
factor, system factor, psychological switching cost factor. J.
Soc. e-Bus. Stud. 19(1), 1542 (2014)
282
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________