Classification of Attaks over Cloud Environment

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.




References:
[1] Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid
computing 360-degree compared. In: Grid Computing
EnvironmentsWorkshop, pp. 1–10. IEEE (2008).
DOI:10.1109/GCE.2008.4738445.
[2] Viega, J.: Cloud computing and the common man. Computer 42(8),
106–108 (2009). doi:10.1109/MC.2009.252.
[3] NIST: NIST Cloud Computing Program. http://www.nist.gov/itl/ cloud/
(2012). Accessed Sept. 2012.
[4] Banerjee, P., Friedrich, R., Bash, C., Goldsack, P., Huberman,
B.,Manley, J., Patel, C., Ranganathan, P., Veitch, A.: Everything as
aservice: powering the newinformation economy. Computer 44(3),36–
43 (2011). doi:10.1109/MC.2011.67.
[5] Boampong, P.A., Wahsheh, L.A.: Different facets of security in the
cloud. In: Proceedings of the 15th Communications and Networking
Simulation Symposium, pp. 5:1–5:7. Society for Computer Simulation
International, San Diego, CA, USA (2012).
[6] Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of
cloud computing. In: 39th International Conference on Parallel
ProcessingWorkshop, pp. 275–279. IEEE Computer Society,
Washington, DC, USA (2010). doi:10.1109/ICPPW.2010.45.
[7] Khorshed,M.T., Ali, A.S.,Wasimi, S.A.: A survey on gaps, threat
remediation challenges and some thoughts for proactive attack detection
in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851
(2012). doi:10.1016/j.future.2012.01.006.
[8] Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the
cloud? An architectural map of the cloud landscape. In: Proceedings of
the ICSE Workshop on Software Engineering Challenges of Cloud
Computing, pp. 23–31. IEEE Computer Society, Washington, DC, USA
(2009). doi:10.1109/CLOUD. 2009.5071529.
[9] Patidar, S., Rane, D., Jain, P.: A survey paper on cloud computing. In:
2nd International Conference on Advanced Computing Communication
Technologies, pp. 394–398. IEEE (2012). doi:10. 1109/ACCT.2012.15.
[10] Sadashiv, N., Kumar, S.: Cluster, grid and cloud computing: a detailed
comparison. In: 6th International Conference on Computer Science
Education, pp. 477–482. IEEE (2011). doi:10.1109/
ICCSE.2011.6028683.
[11] Subashini, S., Kavitha, V.: A survey on security issues in service
delivery models of cloud computing. J. Netw. Comput. Appli. 34(1), 1–
11 (2011). doi:10.1016/j.jnca.2010.07.006.
[12] Xiao, Z., Xiao,Y.: Security and privacy in cloud computing. IEEE
Commun. Surv. Tuts. 15(2), 843–859 (2013). doi:10.1109/SURV.
2012.060912.00182.
[13] Aguiar, E., Zhang, Y., Blanton, M.: An Overview of Issues andRecent
Developments in Cloud Computing and Storage Security, pp. 1–31.
Springer, Berlin (2013).
[14] Boampong, P.A., Wahsheh, L.A.: Different facets of security inthe
cloud. In: Proceedings of the 15th Communications and Networking
Simulation Symposium, pp. 5:1–5:7. Society for Computer Simulation
International, San Diego, CA, USA (2012).
[15] Gul, I., Rehman, A., Islam, M.: Cloud computing security auditing.In:
The 2nd International Conference on Next Generation Information
Technology, pp. 143–148. IEEE (2011).
[16] Mohamed, E., Abdelkader, H., El-Etriby, S.: Enhanced data security
model for cloud computing. In: 8th International Conference on
Informatics and Systems, pp. CC-12–CC-17. IEEE (2012).
[17] Ramgovind, S., Eloff, M., Smith, E.: The management of security in
cloud computing. In: Information Security for South Africa, pp. 1–7.
IEEE (2010). doi:10.1109/ISSA.2010.5588290.
[18] Sabahi, F.: Cloud computing security threats and responses. In: IEEE
3rd International Conference on Communication Software and
Networks, pp. 245–249. IEEE (2011). doi:10.1109/ICCSN.
2011.6014715.
[19] Songjie, Yao, J.,Wu, C.: Cloud computing and its key techniques. In:
International Conference on Electronic and Mechanical Engineering and
Information Technology, vol. 1, pp. 320–324. IEEE
(2011).doi:10.1109/EMEIT.2011.6022935.
[20] Subashini, S., Kavitha, V.: A survey on security issues in service
delivery models of cloud computing. J. Netw. Comput. Appli. 34(1), 1–
11 (2011). doi:10.1016/j.jnca.2010.07.006.
[21] Yang, J., Chen, Z.: Cloud computing research and security issues. In:
International Conference on Computational Intelligence and Software
Engineering, pp. 1–3. IEEE (2010). doi:10.1109/CISE. 2010.5677076.
[22] Enterprise Risk Management-Integrated Framework Executif Summary
September 2004.Pdf
[23] H.J. Pasman, S. Jung, K. Prem, W.J. Rogers, X. Yang. Is Risk Analysis
A Useful Tool For Improving Process Safety?. Journal Of Loss
Prevention In The Process Industries 22 (2009) P. 769–777.
[24] P.K. Marhavilasa, D. Koulouriotisb, V.Gemenib. Risk Analysis And
Assessment Methodologies In The Work Sites: On A Review,
Classification And Comparative Study Of The Scientific Literature Of
The Period 2000–2009. Journal Of Loss Prevention In The Process
Industries Volume 24, Issue 5, September 2011, Pages 477–523.
[25] Ronald L. Krutz And Russell Dean Vines, Cloud Security. A
Comprehensive Guide To Secure Cloud Computing.
[26] J.Heiser And Mark Nicolett: “Assessing The Security Risks Of Cloud
Computing.” Gartner, 3 June 2008
<Www.Gartner.Com/Displaydocument?Id=68 5308>Ages. SPIE.
[27] Cloud Security Alliance, Security Guidance for Critical Areas of Focus
in Cloud Computing V2.1 5.
[28] Peter Mell, Timothy Grance “The NIST Definition of Cloud Computing
Special Publication 800-142”