Abstract
Cloud computing provides the virtual environment for users to access the hardware resources and services. The resources such as storage, applications, services, networks and servers that quickly prerequisite and remain unhindered with insignificant management effort. Security is one of the major factors in cloud computing, and many users are paid for on-demand cloud resources and services. Some of the users are not authorized to access, misappropriate or change data that are called as attackers. The cloud is committed to preserving the integrity and dependability of the data, it contains by the cloud service provider. The attackers are degrading the performance of services as well as make the legitimate users unable to receive response on time. This paper presents an overview on cloud computing, attacks on cloud and their possible security solutions with merits and demerits. There are many security schemes proposed previously, but each of them had some constrained related to configuration, computing and storage. The researchers are continuously giving the contribution in the field of cloud security to improve communication and the performance of the network. It is very typical for the security scheme to identify the normal or a malicious user on the network. Hence, there is demand of strong security schemes that can easily identify the malicious users as well as can handle the adverse effect of attackers in cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mell P, Grance T (7 Oct 2009) The NIST definition of cloud computing, version 15, national institute of standards and technology
Zhao G, Liu, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud computing: a statistics aspect of users. In: First international conference on CC (CloudCom). Beijing, Springer, Berlin, Hiedelberg, pp 347–358
Mishra H, Makad J, Pathak N, Soni G (April 2021) Cloud based career guidance system. Int J Sci Res Comput Sci, Eng Inf Technol (IJSRCSEIT) ISSN No. 2456-330
Yu S, Guo S, Stojmenovic I (2012) Can we beat legitimate cyber behavior mimicking attacks from botnets? In: Proceedings INFOCOM. pp 2851–2855
Soni G, Chandravanshi K (26–27 Aug 2021) Security scheme to identify malicious maneuver of flooding attack for WSN in 6G. In: 8th international conference on signal processing and integrated networks
Podilchuk C, Delp E (2001) Digital watermarking algorithms and its applications. IEEE Sig Process Mag 18(4):33–46
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of CC. ACM Commun 53(4):50–58
Ong Z. Picture this: chinese internet giant Tencents Qzone social network now hosts over 150 billion photos 2012. Available at: http://thenextweb.com/asia/2012/08/09/picture-thischinese-internet-giant-tencents-qzone-social-network-now-hosts-over-150-billion-photos
Soni KG, Chandravanshi K, Jhariya MK, Tomar DS (Feb 2020) A multipath location based hybrid DMR protocol in MANET. IEEE international conference on emerging technologies in computer engineering (ICETCE)
Gautam T, Jain A (2015) Analysis of brute force attack using TG–dataset. IEEE SAI intelligent systems conference (IntelliSys)
Jose J, Tomy TT, Karunakaran V, Krishna VA, Varkey A, Nisha CA (2016) Securing passwords from dictionary attack with character-tree. IEEE international conference on wireless communications, signal processing and networking (WiSPNET)
Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in CC: issues, taxonomy and future directions. Comput Commun 107:30–48
Khadka B, Withana C, Alsadoon A, Elchouemi A (2015) Distributed denial of service attack on cloud: detection and prevention. IEEE International Conference And Workshop On Computing And Communication
Jindal K, Dalal S, Sharma KK (2014) Analyzing spoofing attacks in wireless networks. IEEE fourth international conference on advanced computing and communication technologies
Sowmya S, Malarchelvi PDSK (2014) A survey of jamming attack prevention techniques in wireless networks. IEEE international conference on information communication and embedded systems
Eigner O, Kreimel P, Tavolato P (2016) Detection of man-in the- middle attacks on industrial control networks. IEEE international conference on software security and assurance
Andri J, Oreski D, Kisasondi T (2016) Analysis of phishing attacks against students. MIPRO, May 30–June 3
Singh P, Saroj SK (2020) A secure data dynamics and public auditing scheme for cloud storage. IEEE 6th international conference on advanced computing and communication systems (ICACCS)
Ranjan I, Agnihotri RB (2019) Ambiguity in cloud security with malware-injection attack. Proceedings of the third international conference on electronics communication and aerospace technology (ICECA)
Bin C, Xiaoyi Y (2019) Research on the application and security of CC in smart power grids. IEEE 4th international conference on mechanical, control and computer engineering (ICMCCE)
Thangavel M, Varalakshmi (2020) Enabling ternary hash tree based integrity verification for secure cloud data storage. IEEE computer society
Salunke PM, Mahale VV (2018) Secure data sharing in distributed cloud environment. Proceedings of the second international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2018)
Selvanayagam J, Singh A, Michael J, Jeswani J (March 2018) Secure file storage on cloud using cryptography. Int Res J Eng Technol (IRJET) 5(3) e-ISSN: 2395-0056
Sinchana MK, Savithramma RM, Liu DQ (2020) Survey on CC security. Innovations in computer science and engineering. pp 1–6
Dhakrey H (2018) Secure file storage in cloud computing, School of computer science engineering. Galgotias University
Shaohua H, Nanfeng X (2020) Abnormal traffic monitoring methods based on a cloud computing platform. IEEE 5th international conference on cloud computing and big data analytics
Sengupta B, Dixit A, Ruj S (2020) Secure cloud storage with data dynamics using secure network coding techniques. IEEE transactions on cloud computing
Huang M (2021) Design of basic process of information security risk assessment in cloud computing environment. IEEE international conference on consumer electronics and computer engineering (ICCECE 2021)
An S, Eom T, Park JS, Hong JB (2019) CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE international conference on trust, security and privacy in computing and communications/13th IEEE international conference on big data science and engineering
Acknowledgements
I take this opportunity to gratefully acknowledge the assistance of my college faculty and guides Prof. Uday Chourasia and Dr. Raju Baraskar, who had faith in me. I am also very much grateful to UIT RGPV, Dept. of CSE for motivating the students.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jain, P., Barskar, R., Chourasia, U. (2022). Attacks and Security Schemes in Cloud Computing: A Survey. In: Kumar, A., Ghinea, G., Merugu, S., Hashimoto, T. (eds) Proceedings of the International Conference on Cognitive and Intelligent Computing. Cognitive Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-19-2350-0_81
Download citation
DOI: https://doi.org/10.1007/978-981-19-2350-0_81
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2349-4
Online ISBN: 978-981-19-2350-0
eBook Packages: Computer ScienceComputer Science (R0)