Abstract
Nowadays Cloud Computing provides anew paradigm to organizations, offering advantages, not only for its speed but also for the opportunity of save costs when implementing new applications, by just paying for the resources you use. This article identifies the threats, risks and attacks, also identifies their causes, in addition, proposed solutions from the National Institute of Standards Organization and Technology (NIST) and Cloud Security Alliance (CSA) are also mentioned here.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and solutions. Paper presented at the 7th international conference on informatics and systems (INFOS), pp 1–8
Zhao Y, Foster I, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Grid computing environments workshop (GCE'08), pp 1–10
W. J. (2011) Guidelines on security and privacy in public cloud computing. NIST J 1–60
Grance T, Mell P (2009) Definition of cloud computing. NIST J 1–7
Cloud Security Alliance (2009) Security guidance for critical areas of focus in cloud computing V2.1. J Ala Acad Sci 76
Khajeh-Hosseini A, Sriram I (2010) Research agenda in cloud technologies. Technical Report.
Schubert L, Jeffery K, Neidecker-Lutz B (2010) The future of cloud computing opportunities for European cloud computing beyond 2010. ACC 2011, Part IV, pp 1–71
Creese S, Goldsmith M, Auty M, Hopkin P (2010) Inadequacies of current risk controls for the cloud. In: 2nd IEEE international conference on cloud computing technology and science, pp 659–666
Chen Z, Yang J (2010) Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 1–3
Marinos A, Briscoe G (2009) Community cloud computing. First international conference on cloud computing. pp 1–12
Souppaya M, Scarfone K, Hoffman P (2010) Guide to security for full virtualization. Recommendation of the national institute of standards and technology (NIST), pp 1–35
Kong J (2010) A practical approach to improve the data privacy of virtual machines. 10th IEEE international conference on computer and information technology (CIT 2010). pp 936–941
Payal S, Amarnath J, Rajeev N, Ravi P (2010) Security in muiti-tenancy cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 4–7
Liu DQ, Srinivasamurthy S (2010) Survey on cloud computing security. In: 2nd IEEE international conference on cloud computing technology and science. pp 8–12
Cloud Security Alliance (2010) Top threats to cloud computing V1.0. J Ala Acad Sci 14–16
INTECO (2011) Riesgos y amenazas en cloud computing. pp 1–32
Gartner (2008) Assessing the security risk of cloud computing.
Hanna S (2009) A security analysis of cloud computing. Cloud Comput J http://cloudcomputing.sys-con.com/node/1203943
Gregg M (2009) 10 security concerns for cloud computing. Global Knowledge. pp 1–7
Centre for the protection of national infrastructure (CPNI) (2010) Information security briefing cloud computing. 203.128.31.71/articles/9New7IBHp4z.pdf
Amardeep S, Vem E (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302
Vrbsky SV, Zunnurhain K (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science. pp 1–4
Jansen WA (2011) Cloud hook: security and privacy issues in cloud computing. 44th Hawaii international conference on system sciences. pp 1–10
Amardeep Singh Er. VEM (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302
Nube computacional. Autoridad de Innovación Gubernamental de Panamá
Gaceta Oficial, República de Panamá, Ministerio de la Presidencia, Decreto Ejecutivo No. 709
ENISA (2011) Seguridad y resistencia en las nubes de la Administración Pública. pp 1–135
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Leguías Ayala, I.D.C., Vega, M., Vargas-Lombardo, M. (2013). Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing. In: Elleithy, K., Sobh, T. (eds) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 152. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3535-8_4
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3535-8_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3534-1
Online ISBN: 978-1-4614-3535-8
eBook Packages: EngineeringEngineering (R0)