Advertisement

Cloud Computing

  • Ramjee PrasadEmail author
  • Vandana Rohokale
Chapter
Part of the Springer Series in Wireless Technology book series (SSWT)

Abstract

Cloud computing is a platform that provides state of the art information technology resources which are cheaper, scalable and easy to manage. But the cloud properties such as high scalability, quick deployment, dynamic resource range, high computing power, high bandwidth, etc. are exploited by cyber criminals as the tools for introducing new cybercrimes. These cybercrimes include DDoS as a service, Botnet as a service, Malware as a service, password cracking, BotClouds, C&C servers, Warez as a service, etc.

References

  1. Abdullah S, Bakar KAA (2018) Security and privacy challenges in cloud computing. In: Cyber resilience conference (CRC)Google Scholar
  2. Alshammari A, Alhaidari S, Alharbi A, Zohdy M (2017) Security threats and challenges in cloud computing. In: IEEE 4th international conference on cyber security and cloud computingGoogle Scholar
  3. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616CrossRefGoogle Scholar
  4. Cable P (2018) How to create a threat model for cloud infrastructure security. Threat Stack AWS SECURITY Blog. https://www.threatstack.com/blog/how-to-create-a-threat-model-for-cloud-infrastructure-security
  5. Feller E, Rilling L, Morin C (2012) Snoze: a scalable and automatic virtual machine management framework for private clouds. In: Proceedings of CCGrid’12, Ottawa, Canada, pp 482–489 (2012)Google Scholar
  6. Ganga K, Karthik S (2013) A fault tolerant approach in scientific workflow systems based on cloud computing. In: IEEE international conference on pattern recognition, informatics and medical engineering (PRIME), pp 387–390Google Scholar
  7. Halabi T, Bellaiche M, Abusitta A (2018) A cooperative game for online cloud federation formation based on security risk assessment. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp 83–88Google Scholar
  8. Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Open Access J Comput 3:1–35CrossRefGoogle Scholar
  9. Kuranda S (2016) The 10 biggest data breaches of 2016 (So Far). CRN article, 28 July 2016. http://www.crn.com/slide-shows/security/300081491/the-10-biggest-data-breaches-of-2016-so-far.htm
  10. Lei M, Vrbsky SV, Hong X (2008) An on-line replication strategy to increase availability in data grids. Future Gener Comput Syst 24(2):85–98CrossRefGoogle Scholar
  11. Li Y, Lan ZFREM (2011) a fast restart mechanism for general checkpoint/restart. IEEE Trans Comput 60(5):639–652MathSciNetCrossRefGoogle Scholar
  12. Li J, Humphrey M, Cheah YW, Ryu Y, Agarwal D, Jackson K, van Ingen C (2010) Fault tolerance and scaling in e-Science cloud applications: observations from the continuing development of MODISAzure. In: 6th International Conference on e-Science (e-Science), IEEE, pp 246–253Google Scholar
  13. Lord N (2017) The history of data breaches. Digital Guardian Blog, 27 Jan 2017. https://digitalguardian.com/blog/history-data-breaches
  14. Marzouk S, Jmaiel M (2011) A survey on software check-pointing and mobility techniques in distributed systems. Concurr Comput 23(11):1196–1212CrossRefGoogle Scholar
  15. Naik N, Jenkins P (2016) An analysis of open standard identity protocols in cloud computing security paradigm. In: IEEE 14th International conference on dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, with 2nd international conference on big data intelligence and computing and cyber science and technology congressGoogle Scholar
  16. Nie W, Xiao X, Wu Z, Wu Y, Shen F, Luo X (2018) The research of information security for the education cloud platform based on AppScan technology. In: 5th IEEE international conference on cyber security and cloud computing (CSCloud) and 4th IEEE international conference on edge computing and scalable cloud (EdgeCom)Google Scholar
  17. Puri S, Agnihotri M (2017) A proactive approach for cyber attack mitigation in cloud network. In: International conference on energy, communication, data analytics and soft computing (ICECDS)Google Scholar
  18. Shvachko K, Kuang H, Radia S, Chansler R (2010) The Hadoop distributed file system. In: Proceedings of 2010 IEEE 26th symposium on mass storage systems and technologies (MSST 2010). IEEE Press, New York, pp 1–10Google Scholar
  19. Vishwanath K, Nagappan N (2010) Characterizing cloud computing hardware reliability. In: Proceeding of SoCC’10, Indianpolis, IN, USA, pp 193–204Google Scholar
  20. Yuan D, Yang Y, Liu X, Chen J (2010) A data placement strategy in scientific cloud workflows. Future Gener Comput Syst 26(8):1200–1214CrossRefGoogle Scholar
  21. Zheng Z, Zhou TC, Lyu MR, King I (2010) FTCloud: a component ranking framework for fault tolerant cloud applications. In IEEE 21st international symposium on software reliability engineering (ISSRE 2010), pp 398–407, Nov 2010Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Business Development and Technology, CTIF Global CapsuleAarhus UniversityHerningDenmark
  2. 2.Department of Electronics and TelecommunicationSinhgad Institute of Technology and SciencePuneIndia

Personalised recommendations