Skip to main content

Attacks and Security Schemes in Cloud Computing: A Survey

  • Conference paper
  • First Online:
Proceedings of the International Conference on Cognitive and Intelligent Computing

Part of the book series: Cognitive Science and Technology ((CSAT))

  • 657 Accesses

Abstract

Cloud computing provides the virtual environment for users to access the hardware resources and services. The resources such as storage, applications, services, networks and servers that quickly prerequisite and remain unhindered with insignificant management effort. Security is one of the major factors in cloud computing, and many users are paid for on-demand cloud resources and services. Some of the users are not authorized to access, misappropriate or change data that are called as attackers. The cloud is committed to preserving the integrity and dependability of the data, it contains by the cloud service provider. The attackers are degrading the performance of services as well as make the legitimate users unable to receive response on time. This paper presents an overview on cloud computing, attacks on cloud and their possible security solutions with merits and demerits. There are many security schemes proposed previously, but each of them had some constrained related to configuration, computing and storage. The researchers are continuously giving the contribution in the field of cloud security to improve communication and the performance of the network. It is very typical for the security scheme to identify the normal or a malicious user on the network. Hence, there is demand of strong security schemes that can easily identify the malicious users as well as can handle the adverse effect of attackers in cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mell P, Grance T (7 Oct 2009) The NIST definition of cloud computing, version 15, national institute of standards and technology

    Google Scholar 

  2. Zhao G, Liu, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud computing: a statistics aspect of users. In: First international conference on CC (CloudCom). Beijing, Springer, Berlin, Hiedelberg, pp 347–358

    Google Scholar 

  3. Mishra H, Makad J, Pathak N, Soni G (April 2021) Cloud based career guidance system. Int J Sci Res Comput Sci, Eng Inf Technol (IJSRCSEIT) ISSN No. 2456-330

    Google Scholar 

  4. Yu S, Guo S, Stojmenovic I (2012) Can we beat legitimate cyber behavior mimicking attacks from botnets? In: Proceedings INFOCOM. pp 2851–2855

    Google Scholar 

  5. Soni G, Chandravanshi K (26–27 Aug 2021) Security scheme to identify malicious maneuver of flooding attack for WSN in 6G. In: 8th international conference on signal processing and integrated networks

    Google Scholar 

  6. Podilchuk C, Delp E (2001) Digital watermarking algorithms and its applications. IEEE Sig Process Mag 18(4):33–46

    Article  Google Scholar 

  7. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of CC. ACM Commun 53(4):50–58

    Article  Google Scholar 

  8. Ong Z. Picture this: chinese internet giant Tencents Qzone social network now hosts over 150 billion photos 2012. Available at: http://thenextweb.com/asia/2012/08/09/picture-thischinese-internet-giant-tencents-qzone-social-network-now-hosts-over-150-billion-photos

  9. Soni KG, Chandravanshi K, Jhariya MK, Tomar DS (Feb 2020) A multipath location based hybrid DMR protocol in MANET. IEEE international conference on emerging technologies in computer engineering (ICETCE)

    Google Scholar 

  10. Gautam T, Jain A (2015) Analysis of brute force attack using TG–dataset. IEEE SAI intelligent systems conference (IntelliSys)

    Google Scholar 

  11. Jose J, Tomy TT, Karunakaran V, Krishna VA, Varkey A, Nisha CA (2016) Securing passwords from dictionary attack with character-tree. IEEE international conference on wireless communications, signal processing and networking (WiSPNET)

    Google Scholar 

  12. Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in CC: issues, taxonomy and future directions. Comput Commun 107:30–48

    Google Scholar 

  13. Khadka B, Withana C, Alsadoon A, Elchouemi A (2015) Distributed denial of service attack on cloud: detection and prevention. IEEE International Conference And Workshop On Computing And Communication

    Google Scholar 

  14. Jindal K, Dalal S, Sharma KK (2014) Analyzing spoofing attacks in wireless networks. IEEE fourth international conference on advanced computing and communication technologies

    Google Scholar 

  15. Sowmya S, Malarchelvi PDSK (2014) A survey of jamming attack prevention techniques in wireless networks. IEEE international conference on information communication and embedded systems

    Google Scholar 

  16. Eigner O, Kreimel P, Tavolato P (2016) Detection of man-in the- middle attacks on industrial control networks. IEEE international conference on software security and assurance

    Google Scholar 

  17. Andri J, Oreski D, Kisasondi T (2016) Analysis of phishing attacks against students. MIPRO, May 30–June 3

    Google Scholar 

  18. Singh P, Saroj SK (2020) A secure data dynamics and public auditing scheme for cloud storage. IEEE 6th international conference on advanced computing and communication systems (ICACCS)

    Google Scholar 

  19. Ranjan I, Agnihotri RB (2019) Ambiguity in cloud security with malware-injection attack. Proceedings of the third international conference on electronics communication and aerospace technology (ICECA)

    Google Scholar 

  20. Bin C, Xiaoyi Y (2019) Research on the application and security of CC in smart power grids. IEEE 4th international conference on mechanical, control and computer engineering (ICMCCE)

    Google Scholar 

  21. Thangavel M, Varalakshmi (2020) Enabling ternary hash tree based integrity verification for secure cloud data storage. IEEE computer society

    Google Scholar 

  22. Salunke PM, Mahale VV (2018) Secure data sharing in distributed cloud environment. Proceedings of the second international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2018)

    Google Scholar 

  23. Selvanayagam J, Singh A, Michael J, Jeswani J (March 2018) Secure file storage on cloud using cryptography. Int Res J Eng Technol (IRJET) 5(3) e-ISSN: 2395-0056

    Google Scholar 

  24. Sinchana MK, Savithramma RM, Liu DQ (2020) Survey on CC security. Innovations in computer science and engineering. pp 1–6

    Google Scholar 

  25. Dhakrey H (2018) Secure file storage in cloud computing, School of computer science engineering. Galgotias University

    Google Scholar 

  26. Shaohua H, Nanfeng X (2020) Abnormal traffic monitoring methods based on a cloud computing platform. IEEE 5th international conference on cloud computing and big data analytics

    Google Scholar 

  27. Sengupta B, Dixit A, Ruj S (2020) Secure cloud storage with data dynamics using secure network coding techniques. IEEE transactions on cloud computing

    Google Scholar 

  28. Huang M (2021) Design of basic process of information security risk assessment in cloud computing environment. IEEE international conference on consumer electronics and computer engineering (ICCECE 2021)

    Google Scholar 

  29. An S, Eom T, Park JS, Hong JB (2019) CloudSafe: a tool for an automated security analysis for cloud computing. 18th IEEE international conference on trust, security and privacy in computing and communications/13th IEEE international conference on big data science and engineering

    Google Scholar 

Download references

Acknowledgements

I take this opportunity to gratefully acknowledge the assistance of my college faculty and guides Prof. Uday Chourasia and Dr. Raju Baraskar, who had faith in me. I am also very much grateful to UIT RGPV, Dept. of CSE for motivating the students.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jain, P., Barskar, R., Chourasia, U. (2022). Attacks and Security Schemes in Cloud Computing: A Survey. In: Kumar, A., Ghinea, G., Merugu, S., Hashimoto, T. (eds) Proceedings of the International Conference on Cognitive and Intelligent Computing. Cognitive Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-19-2350-0_81

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-2350-0_81

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-2349-4

  • Online ISBN: 978-981-19-2350-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics