Professional Documents
Culture Documents
CLOUD COMPUTING
resource-freeing attacks.
Threats to
Availability
This paper is discussed by security
attacks and security threads in cloud
computing. Fig.1-Types of security threads in cloud
computing
KEYWORDS: security attacks, security
threads, API, cloud computing, DoS. Security threads are identified a threat as
a potential for violation of security, which exists
INTRODUCTION:
when there is a circumstance, capability, action,
Security attacks are identified an attack or event that could breach security and cause
as an assault on system security that derives from harm. In addition to the regular threats to network
an intelligent threat, i.e., an intelligent act that is security, the unique nature of cloud computing
a deliberate attempt to evade security services creates a different type of threats that are
and violate the security policy of a system. Cloud available only in a cloud environment. For
computing, as any other platform, is a target for example, attacks on cloud components such as
many attacks. These attacks have different aims hypervisors are not available in the classic
starting from reconnaissance, to eavesdropping, network security terminology. In their “The
and all the way up to complete system failure. Notorious Nine” report, Cloud Security Alliance
(CSA) has identified nine threats that represent As this threat exists in IaaS, SaaS, and
most important threats to cloud computing PaaS service model, mitigation of it is not a
security in the year 2013 simple task. The interaction between data
breaches and data loss is delicate and the
emergency plans need to be crafted carefully.
One way of eliminating data breaches is to
Denial of encrypt all of the client data. This encryption is
Service done using a key. To keep information secure, the
Attacks
key should be with the client only and not stored
on the cloud itself. However, if the encryption
key is lost, the client would have a complete data
Attacks on Attacks on loss. Thus, the client would need to have a backup
Confidentiality Hypervisor
Security Attacks in Cloud copy of the data, somewhere else, or even off-line
Computing backup. The client should keep in mind that
having more copies of the data would potentially
increase the probability of data breaches.
REFERENCES: