Abstract
Technological and advanced systems, such as cloud computing, suffer different kinds of attacks, be it a small, medium, or large cloud solution provider. In fact, the size of the cloud provider does not avoid it from suffering a cyber attack. Most of these attacks are common and already identified by security experts, while other attacks can be considered new in the perspective of how they are applied and what they can achieve in cloud systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chou T-S (2013) Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol 5(3):79
Sen J (2013) Security and privacy issues in cloud computing. Archit Protoc Secur Inf Technol Infrastruct 1:1–45
Gruschka N, Jensen M (2010) Attack surfaces: a taxonomy for attacks on cloud services. IEEE Cloud 8:40–50
Mahajan H, Giri N (2014) Threats to cloud computing security. VESIT, International Technological Conference-2014 (I-TechCON)
Hashizume K et al (2013) An analysis of security issues for cloud computing. J Int Serv Appl 4.1:1
Singh S (2014) Cloud computing attacks: a discussion with solutions. Open J Mob Comput Cloud Comput 1.1:1–8
Singh A, Shrivastava M (2012) Overview of attacks on cloud computing. Int J Eng Innov Technol (IJEIT) 1.4:85–97
Modi C et al (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592
Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3(1):1–35
Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, IEEE
Singh R, Kumar S, Kumar Agrahari S (2012) Ensuring data storage security in cloud computing. IOSR J Eng 2:12
Acharya S, Siddappa M (2016) A novel method of designing and implementation of security challenges in data transmission and storage in cloud computing. Int J Appl Eng Res 11(4):2283–2286
Everett C (2016) Ransomware: to pay or not to pay? Comput Fraud Secur 2016(4):8–12
Jabir RM et al (2016) Analysis of cloud computing attacks and countermeasures. 2016 18th International Conference on Advanced Communication Technology (ICACT). IEEE
IMPERVA – Man in the Cloud (MITC) attacks, hacker intelligence initiative. July 2015 https://www.imperva.com/docs/HII_Man_In_The_Cloud_Attacks.pdf
de Oliveira Albuquerque R et al (2015) Leveraging information security and computational trust for cybersecurity. J Supercomput 46:1–35
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Galibus, T., Krasnoproshin, V.V., de Oliveira Albuquerque, R., Pignaton de Freitas, E. (2016). Common Cloud Attacks and Vulnerabilities. In: Elements of Cloud Storage Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-44962-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-44962-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44961-6
Online ISBN: 978-3-319-44962-3
eBook Packages: Computer ScienceComputer Science (R0)