Identifying the Top Threats in Cloud Computing and Its Suggested Solutions: A Survey

The interest in cloud computing has increased rapidly in the last two decades. This increased interest is attributed to the important role played by cloud computing in the various aspects of our life. Cloud computing is recently emerged as a new paradigm for hosting and delivering services over the Internet. It is attractive to business owners as well as to researchers as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. As cloud computing is done through the Internet, it faces several kinds of threats due to its nature, where it depends on the network and its users who are distributed around the world. These threats differ in type, its side effect, its reasons, and its main purposes. This survey presents the most critical threats to cloud computing with its impacts, its reasons, and some suggested solutions. In addition, this survey determines what the main aspects of the cloud and the security attributes that are affected by each one of these threats. As a result of this survey, we order the most critical threats according to the level of its impact.

[1]  Yasir Ahmed Hamza,et al.  Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing , 2013 .

[2]  Sheetal Kalra,et al.  A Survey on Security Threats in Cloud ComputingTechnology , 2014 .

[3]  Issa M. Khalil,et al.  Cloud Computing Security: A Survey , 2014, Comput..

[4]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[5]  Raheem A. Beyah,et al.  MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[6]  D. Meng Data security in cloud computing , 2013, 2013 8th International Conference on Computer Science & Education.

[7]  Khaled M. Khan Security Dynamics of Cloud Computing , 2009 .

[8]  Song Guo,et al.  Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  Deepak H. Sharma,et al.  Cloud Computing - Understanding Risk, Threats, Vulnerability and Controls: A Survey , 2013 .

[10]  O KuyoroS. Survey of Cloud Computing Issues at Implementation Level , 2013 .

[11]  Erik Elmroth,et al.  The Cloud Supply Chain : A Framework for Information, Monitoring, Accounting and Billing , 2011, CloudCom 2011.

[12]  Colin Ting Si Xue,et al.  Benefits and Challenges of the Adoption of Cloud Computing in Business , 2016, CloudCom 2016.

[13]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[14]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[15]  William Allen,et al.  Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions , 2016 .

[16]  D. Manivannan,et al.  A Classification and Characterization of Security Threats in Cloud Computing , 2016, Int. J. Next Gener. Comput..

[17]  Ruby B. Lee,et al.  BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.

[18]  A. B. Dieker,et al.  Cloud Computing Operations Research , 2013 .

[19]  Artur Rot,et al.  Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection , 2017, FedCSIS.

[20]  Massimiliano Rak,et al.  Stealthy Denial of Service Strategy in Cloud Computing , 2015, IEEE Transactions on Cloud Computing.

[21]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[22]  Stephen J. Cohen,et al.  A Decision Framework for Cloud Computing , 2012, 2012 45th Hawaii International Conference on System Sciences.

[23]  Wanchun Dou,et al.  A clusterized firewall framework for cloud computing , 2014, 2014 IEEE International Conference on Communications (ICC).

[24]  Abdullah Ebrahim Alsaadi,et al.  Conceptualising the Right to Data Protection in an Era of Big Data , 2016 .

[25]  Yao Zheng,et al.  DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[26]  Ciprian RACUCIU,et al.  THREATS AND RISKS IN CLOUD COMPUTING , 2015 .

[27]  Xuejiao Liu,et al.  Efficient distributed access control for big data in clouds , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[28]  Garima Gupta,et al.  A Survey on Cloud Security Issues and Techniques , 2014, RCIS 2014.

[29]  R. Chitra,et al.  Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .

[30]  Martine Bellaïche,et al.  A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing , 2017, Future Internet.

[31]  Martin Knahl,et al.  Anomaly Detection in IaaS Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[32]  Weimin Zheng,et al.  Defend Against Denial of Service Attack with VMM , 2009, 2009 Eighth International Conference on Grid and Cooperative Computing.

[33]  Atulay Mahajan,et al.  The Malicious Insiders Threat in the Cloud , 2015 .

[34]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.