Analysis and Survey of Eavesdropping on Cloud Platform and Software as a Service with Security
Sudipta Dey1* and Tathagata Roy Chowdhury2
1Student, Final Year, Department of Computer Science and Engineering, Brainware University, India
2Assistant Professor, Department of Computer Science and Engineering, St Marys Technical Campus, Kolkata, India
*Corresponding Author: Sudipta Dey, Student, Final Year, Department of Computer Science and Engineering, Brainware University, India.
Received:
November 24, 2022; Published: December 26, 2022
Abstract
In this paper, the cloud security with different authentication techniques had been discussed including the models of cloud infrastructure and the securities on those models. This paper focuses on the different attacks which are probably possible at the cloud end and the user end. Here, the attacks like Eavesdropping, Spoofing, DoS or DDoS along with some recent incidences throughout the world had been analyzed in addition to the analytical way to solve those attacks and the probable ways to prevent them.
Keywords: Cloud; Security; Authentication; Platform; SaaS; PaaS; IaaS; Spoofing; Eavesdropping; Dos
References
- Marinescu Dan C. “Cloud computing: theory and practice”. Morgan Kaufmann, (2022).
- Achar Sandesh. "Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape”. International Journal of Computer and Systems Engineering9 (2022): 379-384.
- Marinescu Dan C. “Cloud computing: theory and practice”. Morgan Kaufmann, (2022).
- Kati Sherwin., et al. "Comprehensive Overview of DDOS Attack in Cloud Computing Environment using different Machine Learning Techniques”. Available at SSRN 4096388 (2022).
- Kumari Sushila., et al. "Analysis of Cloud Computing Security Threats and Countermeasures”. 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, (2022).
- Alashhab Ziyad R., et al. "Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy”. Applied Sciences23 (2022): 12441.
- Wang Qingxuan and Ding Wang. "Understanding Failures in Security Proofs of Multi-factor Authentication for Mobile Devices”. IEEE Transactions on Information Forensics and Security (2022).
- Sriram GS. "Resolving security and data concerns in cloud computing by utilizing a decentralized cloud computing option”. International Research Journal of Modernization in Engineering Technology and Science1 (2022): 1269-1273.
- Najm YA., et al. "Cloud computing security for e-learning during COVID-19 pandemic”. Indonesian Journal of Electrical Engineering and Computer Science3 (2022): 1610-1618.
- Kati Sherwin., et al. "Comprehensive Overview of DDOS Attack in Cloud Computing Environment using different Machine Learning Techniques”. (2022).
- Mirkovic J and Reiher P. “A taxonomy of DDoS attack and DDoS defense mechanisms”. ACM SIGCOMM Computer Communication Review 2 (2004): 39-53.
- Masdari Mohammad and Marzie Jalali. "A survey and taxonomy of DoS attacks in cloud computing”. Security and Communication Networks16 (2016): 3724-3751.
- Abusaimeh Hesham. "Security Attacks in Cloud Computing and Corresponding Defending Mechanisims”. International Journal of Advanced Trends in Computer Science and Engineering3 (2020).
- Somani Gaurav., et al. "DDoS attacks in cloud computing: Issues, taxonomy, and future directions”. Computer Communications 107 (2017): 30-48.
Citation
Copyright