Abstract
Cloud computing is a platform that provides state of the art information technology resources which are cheaper, scalable and easy to manage. But the cloud properties such as high scalability, quick deployment, dynamic resource range, high computing power, high bandwidth, etc. are exploited by cyber criminals as the tools for introducing new cybercrimes. These cybercrimes include DDoS as a service, Botnet as a service, Malware as a service, password cracking, BotClouds, C&C servers, Warez as a service, etc.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abdullah S, Bakar KAA (2018) Security and privacy challenges in cloud computing. In: Cyber resilience conference (CRC)
Alshammari A, Alhaidari S, Alharbi A, Zohdy M (2017) Security threats and challenges in cloud computing. In: IEEE 4th international conference on cyber security and cloud computing
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616
Cable P (2018) How to create a threat model for cloud infrastructure security. Threat Stack AWS SECURITY Blog. https://www.threatstack.com/blog/how-to-create-a-threat-model-for-cloud-infrastructure-security
Feller E, Rilling L, Morin C (2012) Snoze: a scalable and automatic virtual machine management framework for private clouds. In: Proceedings of CCGrid’12, Ottawa, Canada, pp 482–489 (2012)
Ganga K, Karthik S (2013) A fault tolerant approach in scientific workflow systems based on cloud computing. In: IEEE international conference on pattern recognition, informatics and medical engineering (PRIME), pp 387–390
Halabi T, Bellaiche M, Abusitta A (2018) A cooperative game for online cloud federation formation based on security risk assessment. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 83–88
Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Open Access J Comput 3:1–35
Kuranda S (2016) The 10 biggest data breaches of 2016 (So Far). CRN article, 28 July 2016. http://www.crn.com/slide-shows/security/300081491/the-10-biggest-data-breaches-of-2016-so-far.htm
Lei M, Vrbsky SV, Hong X (2008) An on-line replication strategy to increase availability in data grids. Future Gener Comput Syst 24(2):85–98
Li Y, Lan ZFREM (2011) a fast restart mechanism for general checkpoint/restart. IEEE Trans Comput 60(5):639–652
Li J, Humphrey M, Cheah YW, Ryu Y, Agarwal D, Jackson K, van Ingen C (2010) Fault tolerance and scaling in e-Science cloud applications: observations from the continuing development of MODISAzure. In: 6th International Conference on e-Science (e-Science), IEEE, pp 246–253
Lord N (2017) The history of data breaches. Digital Guardian Blog, 27 Jan 2017. https://digitalguardian.com/blog/history-data-breaches
Marzouk S, Jmaiel M (2011) A survey on software check-pointing and mobility techniques in distributed systems. Concurr Comput 23(11):1196–1212
Naik N, Jenkins P (2016) An analysis of open standard identity protocols in cloud computing security paradigm. In: IEEE 14th International conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, with 2nd international conference on big data intelligence and computing and cyber science and technology congress
Nie W, Xiao X, Wu Z, Wu Y, Shen F, Luo X (2018) The research of information security for the education cloud platform based on AppScan technology. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom)
Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: International conference on energy, communication, data analytics and soft computing (ICECDS)
Shvachko K, Kuang H, Radia S, Chansler R (2010) The Hadoop distributed file system. In: Proceedings of 2010 IEEE 26th symposium on mass storage systems and technologies (MSST 2010). IEEE Press, New York, pp 1–10
Vishwanath K, Nagappan N (2010) Characterizing cloud computing hardware reliability. In: Proceeding of SoCC’10, Indianpolis, IN, USA, pp 193–204
Yuan D, Yang Y, Liu X, Chen J (2010) A data placement strategy in scientific cloud workflows. Future Gener Comput Syst 26(8):1200–1214
Zheng Z, Zhou TC, Lyu MR, King I (2010) FTCloud: a component ranking framework for fault tolerant cloud applications. In IEEE 21st international symposium on software reliability engineering (ISSRE 2010), pp 398–407, Nov 2010
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prasad, R., Rohokale, V. (2020). Cloud Computing. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-31703-4_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31702-7
Online ISBN: 978-3-030-31703-4
eBook Packages: EngineeringEngineering (R0)