Skip to main content

Criminals in the Cloud: Crime, Security Threats, and Prevention Measures

  • Chapter
Book cover Cybercrime Risks and Responses

Abstract

This chapter is a revised version of the authors’ earlier work (Hutchings, Smith and James 2013), “Cloud Computing for Small Business: Criminal and Security Threats and Prevention Measures,” originally published in Trends and Issues in Crime and Criminal Justice (Canberra: Australian Institute of Criminology). It is included in the current collection with permission. The research was supported by the former Department of Broadband, Communication and the Digital Economy and undertaken at the ARC Centre of Excellence in Policing and Security and the Australian Institute of Criminology. The opinions, findings, and conclusions or recommendations expressed are those of the authors and do not reflect those of the aforementioned agencies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Agrawal, D., El Abbadi, A. and Wang, S. (2011) “Secure Data Management in the Cloud,” Databases in Networked Information Systems 7108: 1–15.

    Article  Google Scholar 

  • Aleem, A. and Sprott, C. R. (2013) “Let Me in the Cloud: Analysis of the Benefit and Risk Assessment of Cloud Platform,” Journal of Financial Crime 20: 6–24.

    Article  Google Scholar 

  • Allen, J. (2010) “Data Security in a Mobile World,” GPSolo 27: 4–6.

    Google Scholar 

  • Aron, J. (2011) “Beware of the Botcloud,” New Scientist 210: 24.

    Google Scholar 

  • Banham, R. (2012) “Few Data Breaches in the Cloud — For Now,” Business Insurance 46: 14.

    Google Scholar 

  • Banks, L. (2010) “Cyber Criminals Using Cloud to Launch Attacks, Security Expert Warns,” http://www.computerworld.com.au/article/363710/cyber_criminals_using_cloud_launch_attacks_security_expert_warns/ (accessed 3 August 2014).

    Google Scholar 

  • Bennett, B. (2012) “Megaupload Raid Underlines Cloud Risk,” NZ Business 26: 54.

    Google Scholar 

  • Blanton, S. and Schiller, C. (2010) “Is There Safety in the Cloud?,” EDUCAUSE Quarterly 32.

    Google Scholar 

  • Blumenthal, M. S. (2011) “Is Security Lost in the Cloud?,” Communications and Strategies: 69–86.

    Google Scholar 

  • Cloud Security Alliance (2010) “Top Threats to Cloud Computing v1.0,” https://cloudsecurityalliance.org/research/top-threats/#_downloads. (accessed 3 August 2014).

  • Dlodlo, N. (2011) “Legal, Privacy, Security, Access and Regulatory Issues in Cloud Computing,” Proceedings of the European Conference on Information Management & Evaluation, 161–8.

    Google Scholar 

  • Fortify (2010) “Vast Scale of Cloud Hacking,” International Journal of Micrographics & Optical Technology 28: 7–8.

    Google Scholar 

  • Grobauer, B., Walloschek, T. and Stoecker, E. (2011) “Understanding Cloud Computing Vulnerabilities,” IEEE Security & Privacy 9: 50–7.

    Article  Google Scholar 

  • Hong Kong Government News (2011) LCQ3 Information Security, Hong Kong: Hong Kong Government News.

    Google Scholar 

  • Hutchings, A., Smith, R. G. and James, L. (2013) “Cloud Computing for Small Business: Criminal and Security Threats and Prevention Measures,” in Trends and Issues in Crime and Criminal Justice no. 456, Canberra, Australia: Australian Institute of Criminology.

    Google Scholar 

  • Karagiannis, E. (2005) “Political Islam and Social Movement Theory: The Case of Hizb ut-Tahrir in Kyrgyzstan.” Religion, State and Society 33 (2): 137–50.

    Article  Google Scholar 

  • Knapp, K. J., Denney, G. D. and Barner, M. E. (2011) “Key Issues on Data Centre Security: An Investigation of Government Audit Reports,” Government Information Quarterly 28: 533–41.

    Article  Google Scholar 

  • Kunick, J. M. (2011) “Navigate the Cloud,” Managing Intellectual Property 210: 18.

    Google Scholar 

  • Mell, P. and Grance, T. (2011) The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology, Gaithersburg: US Department of Commerce/National Institute of Standards and Technology.

    Book  Google Scholar 

  • Mowbray, M. (2009) “The Fog Over the Grimpen Mire: Cloud Computing and the Law,” SCRIPTed Journal of Law, Technology and Society 6: 1–15.

    Google Scholar 

  • Pacella, R. M. (2011) “Hacking the Cloud,” Popular Science 278: 68–71.

    Google Scholar 

  • Ponemon Institute (2011) Security of Cloud Computing Providers Study, Traverse City, MI: Ponemon Institute.

    Google Scholar 

  • Ristenpart, T., Tromer, E., Shacham, H. et al. (2009) “Hey You, Get Off My Cloud: Exploring Information Leakage in Third-party Compute Clouds,” 16th ACM Conference Computer and Communications, Chicago.

    Google Scholar 

  • Schreiber, T. (2004) Session Riding: A Widespread Vulnerability in Today’s Web Applications, Munchen: SecureNet.

    Google Scholar 

  • Smith, R. G., Wolanin, N. and Worthington, G. (2003) “e-Crime Solutions and Crime Displacement,” in Trends & Issues in Crime and Criminal Justice no. 243, Canberra, Australia: Australian Institute of Criminology.

    Google Scholar 

  • Subashini, S. and Kavitha, V. (2011) “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications 34: 1–11.

    Article  Google Scholar 

  • Trend Micro (2011) CloudSecuritySurvey: Global Executive Summary, http://newsroom.trendmicro.com/file.php/194/Global+Cloud+Survey+Exec+Summary_Final+%282%29.pdf (accessed 3 August 2014).

    Google Scholar 

  • Wright, A. (2011) “Cloud Computing and Security,” Toledo Business Journal 27: 20–2.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Alice Hutchings, Russell G. Smith, and Lachlan James

About this chapter

Cite this chapter

Hutchings, A., Smith, R.G., James, L. (2015). Criminals in the Cloud: Crime, Security Threats, and Prevention Measures. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_10

Download citation

Publish with us

Policies and ethics