Skip to main content

Cloud Computing

  • Chapter
  • First Online:
  • 2119 Accesses

Part of the book series: Springer Series in Wireless Technology ((SSWT))

Abstract

Cloud computing is a platform that provides state of the art information technology resources which are cheaper, scalable and easy to manage. But the cloud properties such as high scalability, quick deployment, dynamic resource range, high computing power, high bandwidth, etc. are exploited by cyber criminals as the tools for introducing new cybercrimes. These cybercrimes include DDoS as a service, Botnet as a service, Malware as a service, password cracking, BotClouds, C&C servers, Warez as a service, etc.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Abdullah S, Bakar KAA (2018) Security and privacy challenges in cloud computing. In: Cyber resilience conference (CRC)

    Google Scholar 

  • Alshammari A, Alhaidari S, Alharbi A, Zohdy M (2017) Security threats and challenges in cloud computing. In: IEEE 4th international conference on cyber security and cloud computing

    Google Scholar 

  • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616

    Article  Google Scholar 

  • Cable P (2018) How to create a threat model for cloud infrastructure security. Threat Stack AWS SECURITY Blog. https://www.threatstack.com/blog/how-to-create-a-threat-model-for-cloud-infrastructure-security

  • Feller E, Rilling L, Morin C (2012) Snoze: a scalable and automatic virtual machine management framework for private clouds. In: Proceedings of CCGrid’12, Ottawa, Canada, pp 482–489 (2012)

    Google Scholar 

  • Ganga K, Karthik S (2013) A fault tolerant approach in scientific workflow systems based on cloud computing. In: IEEE international conference on pattern recognition, informatics and medical engineering (PRIME), pp 387–390

    Google Scholar 

  • Halabi T, Bellaiche M, Abusitta A (2018) A cooperative game for online cloud federation formation based on security risk assessment. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 83–88

    Google Scholar 

  • Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Open Access J Comput 3:1–35

    Article  Google Scholar 

  • Kuranda S (2016) The 10 biggest data breaches of 2016 (So Far). CRN article, 28 July 2016. http://www.crn.com/slide-shows/security/300081491/the-10-biggest-data-breaches-of-2016-so-far.htm

  • Lei M, Vrbsky SV, Hong X (2008) An on-line replication strategy to increase availability in data grids. Future Gener Comput Syst 24(2):85–98

    Article  Google Scholar 

  • Li Y, Lan ZFREM (2011) a fast restart mechanism for general checkpoint/restart. IEEE Trans Comput 60(5):639–652

    Article  MathSciNet  Google Scholar 

  • Li J, Humphrey M, Cheah YW, Ryu Y, Agarwal D, Jackson K, van Ingen C (2010) Fault tolerance and scaling in e-Science cloud applications: observations from the continuing development of MODISAzure. In: 6th International Conference on e-Science (e-Science), IEEE, pp 246–253

    Google Scholar 

  • Lord N (2017) The history of data breaches. Digital Guardian Blog, 27 Jan 2017. https://digitalguardian.com/blog/history-data-breaches

  • Marzouk S, Jmaiel M (2011) A survey on software check-pointing and mobility techniques in distributed systems. Concurr Comput 23(11):1196–1212

    Article  Google Scholar 

  • Naik N, Jenkins P (2016) An analysis of open standard identity protocols in cloud computing security paradigm. In: IEEE 14th International conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, with 2nd international conference on big data intelligence and computing and cyber science and technology congress

    Google Scholar 

  • Nie W, Xiao X, Wu Z, Wu Y, Shen F, Luo X (2018) The research of information security for the education cloud platform based on AppScan technology. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom)

    Google Scholar 

  • Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: International conference on energy, communication, data analytics and soft computing (ICECDS)

    Google Scholar 

  • Shvachko K, Kuang H, Radia S, Chansler R (2010) The Hadoop distributed file system. In: Proceedings of 2010 IEEE 26th symposium on mass storage systems and technologies (MSST 2010). IEEE Press, New York, pp 1–10

    Google Scholar 

  • Vishwanath K, Nagappan N (2010) Characterizing cloud computing hardware reliability. In: Proceeding of SoCC’10, Indianpolis, IN, USA, pp 193–204

    Google Scholar 

  • Yuan D, Yang Y, Liu X, Chen J (2010) A data placement strategy in scientific cloud workflows. Future Gener Comput Syst 26(8):1200–1214

    Article  Google Scholar 

  • Zheng Z, Zhou TC, Lyu MR, King I (2010) FTCloud: a component ranking framework for fault tolerant cloud applications. In IEEE 21st international symposium on software reliability engineering (ISSRE 2010), pp 398–407, Nov 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramjee Prasad .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prasad, R., Rohokale, V. (2020). Cloud Computing. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-31703-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-31702-7

  • Online ISBN: 978-3-030-31703-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics