Skip to main content
Log in

RETRACTED ARTICLE: Analysis of security issues of cloud-based web applications

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 19 May 2022

This article has been updated

Abstract

The Cloud computing is a powerful tool to optimize the cost in terms of hardware, controllable, utility to sharing the data, due to abovementioned features most of the organization switching their applications and services on the cloud. Cloud services offer secure and scalable services, but there is always some security problem when data have transmitted from a central storage server to a different cloud, personal and private data commitment increase risk of data confidentiality, integrity, availability, and authentication before one choose a vendor in the cloud or choose the cloud and move services in the cloud. This paper aims to resolve issues and provide the countermeasures relating to security issues in clouds based web applications. The vulnerability scores, its impact on confidentiality, integrity, availability, access complexity, and risk on assets calculated, and it observed most of the vulnerabilities identified during the scanning are related to security due to mis-configurations of web servers. The results analyzed for the vulnerability scores, vulnerabilities impact on confidentiality, integrity, availability, access complexity, and risk are analyzed description, and risk assessment. The countermeasures for each vulnerability based on the experimental results discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Change history

References

  • AbRahman NH, Glisson WB, Yang Y, Choo KKR (2016) Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput 3(1):50–59

    Article  Google Scholar 

  • Albakri SH, Shanmugam B, Samy GN, Idris NB, Ahmed A (2014) Security risk assessment framework for cloud computing environments. Secur Commun Netw 7(11):2114–2124

    Article  Google Scholar 

  • Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 2015:357–383

    Article  MathSciNet  Google Scholar 

  • AlShehri MAR, Mishra S (2019) Feature based comparison and selection of SDN controller. Int J Innov Technol Manag 16(05):1–23

    Article  Google Scholar 

  • Anisetti M, Ardagna C, Damiani E, Gaudenzi F (2017) A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans Serv Comput 2017:1–14

    Google Scholar 

  • Ardagna D, Ciavotta M, Passacantando M (2015) Generalized nash equilibria for the service provisioning problem in multi-cloud systems. IEEE Trans Serv Comput 10(3):381–395

    Article  Google Scholar 

  • Avram MG (2014) Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol 2014:529–534

    Article  Google Scholar 

  • Babu BM, Bhanu MS (2015) Prevention of insider attacks by integrating behavior analysis with risk based access control model to protect cloud. Procedia Comput Sci 2015:157–166

    Article  Google Scholar 

  • Beckers K, Dürrwang J, Holling D (2016) Standard compliant hazard and threat analysis for the automotive domain. Information 7(3):1–35

    Article  Google Scholar 

  • Bellini P, Cenni D, Nesi P (2015) Smart cloud engine and solution based on knowledge base. Procedia Comput Sci 2015:3–16

    Article  Google Scholar 

  • Bower KM (2000) Analysis of variance (ANOVA) using MINITAB. Sci Comput Instrum 2000:64–65

    Google Scholar 

  • Cayirci E, De Oliveira AS (2018) Modelling trust and risk for cloud services. J Cloud Comput 7(1):7–14

    Article  Google Scholar 

  • Chen HC, Lee PP (2013) Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation. IEEE Trans Parallel Distrib Syst 25(2):407–416

    Article  Google Scholar 

  • Chou DC (2015) Cloud computing risk and audit issues. Comput Stand Interfaces 2015:137–142

    Article  Google Scholar 

  • Coppolino L, D’Antonio S, Mazzeo G, Romano L (2017) Cloud security: Emerging threats and current solutions. Comput & Electr Eng 2017:126–140

    Article  Google Scholar 

  • Farn KJ, Lin SK, Fung ARW (2004) A study on information security management system evaluation—assets, threat and vulnerability. Comput Stand Interfaces 26(6):501–513

    Article  Google Scholar 

  • Hong JB, Nhlabatsi A, Kim DS, Hussein A, Fetais N, Khan KM (2019) Systematic identification of threats in the cloud: A survey. Comput Netw 2019:46–69

    Article  Google Scholar 

  • Jung T, Li XY, Wan Z, Wan M (2014) Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans Inf Forensics Secur 10(1):190–199

    Article  Google Scholar 

  • Khan N, Al-Yasiri A (2016) Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Comput Sci 94:485–490

    Article  Google Scholar 

  • Kritikos K, Magoutis K, Papoutsakis M, Ioannidis S (2019) A survey on vulnerability assessment tools and databases for cloud-based web applications. Array 2019:1–21

    Google Scholar 

  • Latha K, Sheela T (2019) Block based data security and data distribution on multi cloud environment. J Ambient Intell Human Comput 2019:1–7

    Google Scholar 

  • Liu JC, Lin CH, Lee KY (2019) Cloud-based personal data protection system and its performance evaluation. Journal of Internet Technology 20(6):1721–1727

    Google Scholar 

  • Mackita M, Shin SY, Choe TY (2019) ERMOCTAVE: a risk management framework for it systems which adopt cloud computing. Future Internet 11(9):1–21

    Article  Google Scholar 

  • Mall S, Saroj SK (2018) A new security framework for cloud data. Procedia Comput Sci 2018:765–775

    Article  Google Scholar 

  • Mell P, Grance T (2011) The NIST definition of cloud computing, pp 1–7

  • Palanikkumar D (2012) An enhanced security enabled sharing of protected cloud storage services by trapdoor commitment based on RSA signature assumption. Bonfring Int J Res Commun Eng 2(3):01–07

    Article  Google Scholar 

  • Patil R, Modi C (2019) An exhaustive survey on security concerns and solutions at different components of virtualization. ACM Comput Surv (CSUR) 52(1):1–38

    Article  Google Scholar 

  • Song MH (2014) Analysis of risks for virtualization technology. Appl Mech Mater 2014:374–377

    Google Scholar 

  • Subramanian N, Jeyaraj A (2018) Recent security challenges in cloud computing. Comput Electr Eng 2018:28–42

    Article  Google Scholar 

  • Wang Y, Wen J, Wang X, Zhou W (2017) Cloud service evaluation model based on trust and privacy-aware. Optik 2017:269–279

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Deanship of Scientific Research at Majmaah University for supporting this work under Project number no. RGP - 2019-27.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunil Kumar Sharma.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-03952-4

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, S., Sharma, S.K. & Alowaidi, M.A. RETRACTED ARTICLE: Analysis of security issues of cloud-based web applications. J Ambient Intell Human Comput 12, 7051–7062 (2021). https://doi.org/10.1007/s12652-020-02370-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02370-8

Keywords

Navigation