Skip to main content

Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing

  • Conference paper
  • First Online:
Innovations and Advances in Computer, Information, Systems Sciences, and Engineering

Abstract

Nowadays Cloud Computing provides anew paradigm to organizations, offering advantages, not only for its speed but also for the opportunity of save costs when implementing new applications, by just paying for the resources you use. This article identifies the threats, risks and attacks, also identifies their causes, in addition, proposed solutions from the National Institute of Standards Organization and Technology (NIST) and Cloud Security Alliance (CSA) are also mentioned here.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: challenges and solutions. Paper presented at the 7th international conference on informatics and systems (INFOS), pp 1–8

    Google Scholar 

  2. Zhao Y, Foster I, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Grid computing environments workshop (GCE'08), pp 1–10

    Google Scholar 

  3. W. J. (2011) Guidelines on security and privacy in public cloud computing. NIST J 1–60

    Google Scholar 

  4. Grance T, Mell P (2009) Definition of cloud computing. NIST J 1–7

    Google Scholar 

  5. Cloud Security Alliance (2009) Security guidance for critical areas of focus in cloud computing V2.1. J Ala Acad Sci 76

    Google Scholar 

  6. Khajeh-Hosseini A, Sriram I (2010) Research agenda in cloud technologies. Technical Report.

    Google Scholar 

  7. Schubert L, Jeffery K, Neidecker-Lutz B (2010) The future of cloud computing opportunities for European cloud computing beyond 2010. ACC 2011, Part IV, pp 1–71

    Google Scholar 

  8. Creese S, Goldsmith M, Auty M, Hopkin P (2010) Inadequacies of current risk controls for the cloud. In: 2nd IEEE international conference on cloud computing technology and science, pp 659–666

    Google Scholar 

  9. Chen Z, Yang J (2010) Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 1–3

    Google Scholar 

  10. Marinos A, Briscoe G (2009) Community cloud computing. First international conference on cloud computing. pp 1–12

    Google Scholar 

  11. Souppaya M, Scarfone K, Hoffman P (2010) Guide to security for full virtualization. Recommendation of the national institute of standards and technology (NIST), pp 1–35

    Google Scholar 

  12. Kong J (2010) A practical approach to improve the data privacy of virtual machines. 10th IEEE international conference on computer and information technology (CIT 2010). pp 936–941

    Google Scholar 

  13. Payal S, Amarnath J, Rajeev N, Ravi P (2010) Security in muiti-tenancy cloud. In: International Conference on Computational Intelligence and Software Engineering (CiSE), pp 4–7

    Google Scholar 

  14. Liu DQ, Srinivasamurthy S (2010) Survey on cloud computing security. In: 2nd IEEE international conference on cloud computing technology and science. pp 8–12

    Google Scholar 

  15. Cloud Security Alliance (2010) Top threats to cloud computing V1.0. J Ala Acad Sci 14–16

    Google Scholar 

  16. INTECO (2011) Riesgos y amenazas en cloud computing. pp 1–32

    Google Scholar 

  17. Gartner (2008) Assessing the security risk of cloud computing.

    Google Scholar 

  18. Hanna S (2009) A security analysis of cloud computing. Cloud Comput J http://cloudcomputing.sys-con.com/node/1203943

  19. Gregg M (2009) 10 security concerns for cloud computing. Global Knowledge. pp 1–7

    Google Scholar 

  20. Centre for the protection of national infrastructure (CPNI) (2010) Information security briefing cloud computing. 203.128.31.71/articles/9New7IBHp4z.pdf

    Google Scholar 

  21. Amardeep S, Vem E (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302

    Google Scholar 

  22. Vrbsky SV, Zunnurhain K (2010) Security attacks and solutions in clouds. In: 2nd IEEE international conference on cloud computing technology and science. pp 1–4

    Google Scholar 

  23. Jansen WA (2011) Cloud hook: security and privacy issues in cloud computing. 44th Hawaii international conference on system sciences. pp 1–10

    Google Scholar 

  24. Amardeep Singh Er. VEM (2011) Attacks and security in cloud computing. Int J Adv Eng Appl pp 300–302

    Google Scholar 

  25. Nube computacional. Autoridad de Innovación Gubernamental de Panamá

    Google Scholar 

  26. Gaceta Oficial, República de Panamá, Ministerio de la Presidencia, Decreto Ejecutivo No. 709

    Google Scholar 

  27. ENISA (2011) Seguridad y resistencia en las nubes de la Administración Pública. pp 1–135

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isabel Del C. Leguías Ayala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Leguías Ayala, I.D.C., Vega, M., Vargas-Lombardo, M. (2013). Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing. In: Elleithy, K., Sobh, T. (eds) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 152. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3535-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3535-8_4

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3534-1

  • Online ISBN: 978-1-4614-3535-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics