Acta Scientific Computer Sciences

Review Article Volume 5 Issue 1

Analysis and Survey of Eavesdropping on Cloud Platform and Software as a Service with Security

Sudipta Dey1* and Tathagata Roy Chowdhury2

1Student, Final Year, Department of Computer Science and Engineering, Brainware University, India
2Assistant Professor, Department of Computer Science and Engineering, St Marys Technical Campus, Kolkata, India

*Corresponding Author: Sudipta Dey, Student, Final Year, Department of Computer Science and Engineering, Brainware University, India.

Received: November 24, 2022; Published: December 26, 2022

Abstract

In this paper, the cloud security with different authentication techniques had been discussed including the models of cloud infrastructure and the securities on those models. This paper focuses on the different attacks which are probably possible at the cloud end and the user end. Here, the attacks like Eavesdropping, Spoofing, DoS or DDoS along with some recent incidences throughout the world had been analyzed in addition to the analytical way to solve those attacks and the probable ways to prevent them.

Keywords: Cloud; Security; Authentication; Platform; SaaS; PaaS; IaaS; Spoofing; Eavesdropping; Dos

References

  1. Marinescu Dan C. “Cloud computing: theory and practice”. Morgan Kaufmann, (2022).
  2. Achar Sandesh. "Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape”. International Journal of Computer and Systems Engineering9 (2022): 379-384.
  3. Marinescu Dan C. “Cloud computing: theory and practice”. Morgan Kaufmann, (2022).
  4. Kati Sherwin., et al. "Comprehensive Overview of DDOS Attack in Cloud Computing Environment using different Machine Learning Techniques”. Available at SSRN 4096388 (2022).
  5. Kumari Sushila., et al. "Analysis of Cloud Computing Security Threats and Countermeasures”. 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, (2022).
  6. Alashhab Ziyad R., et al. "Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy”. Applied Sciences23 (2022): 12441.
  7. Wang Qingxuan and Ding Wang. "Understanding Failures in Security Proofs of Multi-factor Authentication for Mobile Devices”. IEEE Transactions on Information Forensics and Security (2022).
  8. Sriram GS. "Resolving security and data concerns in cloud computing by utilizing a decentralized cloud computing option”. International Research Journal of Modernization in Engineering Technology and Science1 (2022): 1269-1273.
  9. Najm YA., et al. "Cloud computing security for e-learning during COVID-19 pandemic”. Indonesian Journal of Electrical Engineering and Computer Science3 (2022): 1610-1618.
  10. Kati Sherwin., et al. "Comprehensive Overview of DDOS Attack in Cloud Computing Environment using different Machine Learning Techniques”. (2022).
  11. Mirkovic J and Reiher P. “A taxonomy of DDoS attack and DDoS defense mechanisms”. ACM SIGCOMM Computer Communication Review 2 (2004): 39-53.
  12. Masdari Mohammad and Marzie Jalali. "A survey and taxonomy of DoS attacks in cloud computing”. Security and Communication Networks16 (2016): 3724-3751.
  13. Abusaimeh Hesham. "Security Attacks in Cloud Computing and Corresponding Defending Mechanisims”. International Journal of Advanced Trends in Computer Science and Engineering3 (2020).
  14. Somani Gaurav., et al. "DDoS attacks in cloud computing: Issues, taxonomy, and future directions”. Computer Communications 107 (2017): 30-48.

Citation

Citation: Sudipta Dey., et al. “Analysis and Survey of Eavesdropping on Cloud Platform and Software as a Service with Security".Acta Scientific Computer Sciences 5.1 (2023): 130-135.

Copyright

Copyright: © 2023 Sudipta Dey., et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is May 30, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US