CFP last date
20 May 2024
Reseach Article

A Survey on Cloud Security and Various Attacks on Cloud

by Sana Khan, Shumaila Khan, Zuber Farooqui
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 14
Year of Publication: 2016
Authors: Sana Khan, Shumaila Khan, Zuber Farooqui
10.5120/ijca2016911331

Sana Khan, Shumaila Khan, Zuber Farooqui . A Survey on Cloud Security and Various Attacks on Cloud. International Journal of Computer Applications. 147, 14 ( Aug 2016), 17-20. DOI=10.5120/ijca2016911331

@article{ 10.5120/ijca2016911331,
author = { Sana Khan, Shumaila Khan, Zuber Farooqui },
title = { A Survey on Cloud Security and Various Attacks on Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 14 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number14/25825-2016911331/ },
doi = { 10.5120/ijca2016911331 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:56.203875+05:30
%A Sana Khan
%A Shumaila Khan
%A Zuber Farooqui
%T A Survey on Cloud Security and Various Attacks on Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 14
%P 17-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provides a means to store and process data through a collection of resources which can be accessed online. Cloud is a collection of storage and physical machines which are termed as datacenter. Cloud consists of many datacenters located at geographically different places. Every physical machine of datacenter can handle more than one user. Virtualization is the technology behind the cloud to utilize the resources. Virtualization offers that many virtual machines corresponding to every task of user can be submitted for execution on the same physical machine. The virtual machine will get destroyed as soon as task will be finished. To balance load of the cloud datacenters these virtual machines are migrated between physical machines. In this paper a survey is done on cloud security issues.

References
  1. P. Mell, and T. Grance, "The NlST Definition of Cloud Computing,” vol 15, 2009.
  2. S. Dogra and Sahil, “Cloud Computing and its Security Concerns A Survey,” International Journal of Innovative Technology and Exploring Engineering, vol 3, no. 12, pp. 15-18, May 2014.
  3. K. Weins, Cloud Computing Trends: 2014 State of Cloud Survey, accessed December 15, 2014, http://www.rightscale.com/blog/cloudindustry-insights/ cloud-computing-trends-2014-state-cloud-survey.
  4. D. Hubbard, and M. Sutton, "Top Threats to Cloud Computing V1. 0," Cloud Security Alliance, 2010.
  5. Wikipaedia, System Profiler, accessed September 4, 2014,http://en.wikipedia.org/wiki/System_profiler.
  6. F. Li, N. Clarke, M. Papadaki, and P. Dowland, "Behaviour profiling for transparent authentication for mobile devices," 10th European Conference on Information Warfare (ECIW), Tallinn, Estonia, pp. 307- 314, 2011.
  7. K. Xu, F. Wang, and L. Gu, "Profiling-as-a-service in multi-tenant cloud computing environments," 32nd IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 461- 465, 2012.
  8. J. W. Rittinghouse, and J. F. Ransome, Cloud computing: implementation, management, and security, CRC press, 2009.
  9. U. Oktay, and O. K. Sahingoz. "Proxy Network Intrusion Detection System for cloud computing," IEEE International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE),” pp. 98-104, 2013.
  10. M. Rouse, Fuzzy Logic, accessed September 5, 2014, http://whatis.techtarget.com/definition/fuzzy-logic.
  11. J-SR Jang, "ANFIS: adaptive-network-based fuzzy inference system," IEEE Transactions on Systems, Man and Cybernetics, vol. 23, no. 3, pp. 665-685, 1993.
  12. C.C. Lee, “Fuzzy logic in control systems: Fuzzy logic controller-Part II,” IEEE Transaction on. System., Man, Cybernetic., vol. 20, no.2, pp. 404-418, 1990.
  13. C.C. Lee, “Fuzzy logic in control systems: Fuzzy logic controller-Part II,” IEEE Transaction on. System., Man, Cybernetic., vol. 20, no.2, pp. 419-435, 1990.
  14. J. Mirković, D. Cvetković, N. Tomča, S. Cvetićanin, S. Slijepčević, V. Obradović, M. Mrkić, I. Čakulev, L. Kraus, and V. Milutinović. "Genetic algorithms for intelligent internet search: a survey and a package for experimenting with various locality types," IEEE TCCA Newsletter, pp. 118-119, 1999.
  15. M. Skinner, Genetic Algorithms Overview, accessed September 12, 2014, http://geneticalgorithms.aidepot.com/Tutorial/Overview.html.
  16. D. H. Park, Y. Choi, H. K. Kim, and J. K. Kim, "A Review and Classification of Recommender Systems Research," International Proceedings of Economics Development & Research, vol. 5, no. 1, 2011.
  17. C. Chen, D. J. Guan, Y. Huang, and Y. Ou, "Attack Sequence Detection in Cloud Using Hidden Markov Model," Seventh IEEE Asia Joint Conference on Information Security (Asia JCIS),” pp. 100-103, 2012.
  18. W. R. A. Ibrahim, and M. M. Morcos, "Artificial Intelligence and Advanced Mathematical Tools for Power Quality Applications: A Survey," IEEE Power Engineering Review,vol. 21, no. 11, pp. 62-62, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud hypervisor malware side channel attack