Skip to main content

Common Cloud Attacks and Vulnerabilities

  • Chapter
  • First Online:
  • 1029 Accesses

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

Technological and advanced systems, such as cloud computing, suffer different kinds of attacks, be it a small, medium, or large cloud solution provider. In fact, the size of the cloud provider does not avoid it from suffering a cyber attack. Most of these attacks are common and already identified by security experts, while other attacks can be considered new in the perspective of how they are applied and what they can achieve in cloud systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chou T-S (2013) Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol 5(3):79

    Google Scholar 

  2. Sen J (2013) Security and privacy issues in cloud computing. Archit Protoc Secur Inf Technol Infrastruct 1:1–45

    Google Scholar 

  3. Gruschka N, Jensen M (2010) Attack surfaces: a taxonomy for attacks on cloud services. IEEE Cloud 8:40–50

    Google Scholar 

  4. Mahajan H, Giri N (2014) Threats to cloud computing security. VESIT, International Technological Conference-2014 (I-TechCON)

    Google Scholar 

  5. Hashizume K et al (2013) An analysis of security issues for cloud computing. J Int Serv Appl 4.1:1

    Google Scholar 

  6. Singh S (2014) Cloud computing attacks: a discussion with solutions. Open J Mob Comput Cloud Comput 1.1:1–8

    Google Scholar 

  7. Singh A, Shrivastava M (2012) Overview of attacks on cloud computing. Int J Eng Innov Technol (IJEIT) 1.4:85–97

    Google Scholar 

  8. Modi C et al (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592

    Article  Google Scholar 

  9. Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3(1):1–35

    Article  Google Scholar 

  10. Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, IEEE

    Google Scholar 

  11. Singh R, Kumar S, Kumar Agrahari S (2012) Ensuring data storage security in cloud computing. IOSR J Eng 2:12

    Google Scholar 

  12. Acharya S, Siddappa M (2016) A novel method of designing and implementation of security challenges in data transmission and storage in cloud computing. Int J Appl Eng Res 11(4):2283–2286

    Google Scholar 

  13. Everett C (2016) Ransomware: to pay or not to pay? Comput Fraud Secur 2016(4):8–12

    Article  MathSciNet  Google Scholar 

  14. Jabir RM et al (2016) Analysis of cloud computing attacks and countermeasures. 2016 18th International Conference on Advanced Communication Technology (ICACT). IEEE

    Google Scholar 

  15. IMPERVA – Man in the Cloud (MITC) attacks, hacker intelligence initiative. July 2015 https://www.imperva.com/docs/HII_Man_In_The_Cloud_Attacks.pdf

  16. de Oliveira Albuquerque R et al (2015) Leveraging information security and computational trust for cybersecurity. J Supercomput 46:1–35

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Galibus, T., Krasnoproshin, V.V., de Oliveira Albuquerque, R., Pignaton de Freitas, E. (2016). Common Cloud Attacks and Vulnerabilities. In: Elements of Cloud Storage Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-44962-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44962-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44961-6

  • Online ISBN: 978-3-319-44962-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics