Skip to main content

About Cloud Security

  • Chapter
  • First Online:

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

This chapter starts by discussing how cloud computing security is different from classical network security. The chapter mentions some threats and attacks that apply specifically to cloud computing. The chapter elaborates on most recent real-life attacks to cloud computing in the past few years. The chapter also explains the history of Denial of Service attacks along with other attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. R. Shirey, Rfc 2828: Internet security glossary, in The Internet Society (2000), p. 13

    Google Scholar 

  2. W. Stallings, Cryptography and Network Security, 4/E (Pearson Education, Upper Saddle River, 2006)

    Google Scholar 

  3. J. Idziorek, M. Tannian, D. Jacobson, Attribution of fraudulent resource consumption in the cloud, in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD), 2012, pp. 99–106

    Google Scholar 

  4. M.M. Alani, Manet security: a survey, in Proceedings of the IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2014, pp. 559–564

    Google Scholar 

  5. R.V. Deshmukh, K.K. Devadkar, Understanding ddos attack & its effect in cloud environment. Procedia Comput. Sci. 49, 202–210 (2015)

    Article  Google Scholar 

  6. M.M. Alani, Guide to OSI and TCP/IP models (Springer, Berlin, 2014)

    Book  Google Scholar 

  7. J. Graham-Cumming, Understanding and mitigating ntp-based ddos attacks, vol. 9 (Cloudflare Inc, California, 2014)

    Google Scholar 

  8. M. Prince, Technical details behind a 400gbps ntp amplification ddos attack, vol. 13 (Cloudflare Inc, California, 2014)

    Google Scholar 

  9. N. Gruschka, M. Jensen, Attack surfaces: a taxonomy for attacks on cloud services, in Proceedings of the IEEE 3rd International Conference on Cloud Computing, 2010, pp. 276–279

    Google Scholar 

  10. Tripadvisor: E-mail addresses stolen in data breach, http://www.cnet.com/news/tripadvisor-e-mail-addresses-stolen-in-data-breach/. Accessed 27 March 2016

  11. 6 worst data breaches of 2011, http://www.darkreading.com/attacks-and-breaches/6-worst-data-breaches-of-2011/d/d-id/1102001? Accessed 29 March 2016

  12. The sony hack what happened, how did it happen.what did we learn? http://blogs.umb.edu/itnews/2015/01/06/the-sony-hack/. Accessed 29 March 2016

  13. Nasdaq server breach: 3 expected findings, http://www.darkreading.com/attacks-and-breaches/nasdaq-server-breach-3-expected-findings/d/d-id/1100934? Accessed 29 March 2016

  14. J. Hong, The state of phishing attacks. Commun. ACM 55(1), 74–81 (2012)

    Article  Google Scholar 

  15. Data breach at ieee.org: 100k plaintext passwords, http://ieeelog.dragusin.ro/init/default/log. Accessed 29 March 2016

  16. A. Logic, Cloud security report-spring 2014, 2014

    Google Scholar 

  17. J.-M. Brook, R. Brooks, A decade of lessons learned: Transforming the enterprise for todays cloud architecture, in Proceedings of the ICCSM2015 3rd International Conference on Cloud Security and Management: ICCSM2015, Academic Conferences and publishing limited, 2015, p. 16

    Google Scholar 

  18. Salesforce accounts susceptible to hijacking using xss flaw, https://www.elastica.net/salesforce-accounts-susceptible-to-hijacking-using-xss-flaw. Accessed 21 March 2016

  19. M.S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, B. Sunar, Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud (Technical report, IACR Cryptology ePrint Archive, 2015)

    Google Scholar 

  20. N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni et al., Drown: Breaking tls using sslv2

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed M. Alani .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Alani, M.M. (2016). About Cloud Security. In: Elements of Cloud Computing Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-41411-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41411-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41410-2

  • Online ISBN: 978-3-319-41411-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics