Main Article Content

Authors

Rashmi M. Chaudhry

Dr. Pooja Sharma

Abstract

Cloud computing has revolutionized how businesses and individuals store, manage, and process data, offering scalable resources and services through the internet. Its flexibility, cost-efficiency, and ease of access have made it an integral component of modern IT infrastructure. However, the widespread adoption of cloud services also brings significant security challenges. This paper provides an overview of cloud computing, outlining its fundamental concepts, service models (IaaS, PaaS, SaaS), and deployment models (public, private, hybrid, community). Several types of attacks threaten cloud systems, including data breaches, denial-of-service (DoS), insider threats, account hijacking, and insecure APIs. These attacks target critical areas such as data confidentiality, integrity, and availability. In response, cloud service providers (CSPs) employ various security mechanisms. This paper emphasizing the need for robust security frameworks to mitigate attacks in the cloud.

Downloads

Download data is not yet available.

Article Details

Section

Articles

References

  1. Alomari, E. S. Manickam. B. Gupta, S. Karuppayah, and R. Alfaris (2012). Botnet-based distributed denial of service (ddos) attacks on web servers: classification and art. arXiv preprint arXiv:1208.0403.
  2. Attou, H., Guezzaz, A., Benkirane, S., Azrour, M., & Farhaoui, Y. (2023). Cloud-based intrusion detection approach using machine learning techniques. Big Data Mining and Analytics, 6(3), 311-320.
  3. Bhange, A., Syad, A., & Thakur, S. S. (2012). DDoS attacks impact on network traffic and its detection approach. International Journal of Computer Applications, 40(11), 36-40.
  4. Carlin, A., M. Hammoudeh. and O. Aldabbas (2015). Defence for distributed denial of service attacks in cloud computing. Procedia Computer Science, 73, 490-497.
  5. Dadkhah, M., M. D. Jazi, M. S. Mobarakeh, S. Shamshirband, X. Wang, and S. Raste (2016). An overview of phishing attacks and their detection techniques. International Journal of Internet Protocol Technology, %(4), 187195,
  6. FuiFui Wong & Cheng Xiang Tan 2014 ‘A survey of trends in massive DDoS attacks and cloud-based mitigations” International Journal of Network Security & Its Applications (IINSA), Vol.6, No.3.
  7. K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Comput. Soc., pp. 69–73, 2012.
  8. Masdari, M., & Jalali, M. (2016). A survey and taxonomy of DoS attacks in cloud computing. Security and Communication Networks, 9(16), 3724-3751.
  9. P. Oberoi and S. Mittal, “Survey of various security attacks in clouds based environments,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 976, pp. 405–410, 2017.
  10. Somani, G., M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya (2017). Ddos attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48.
  11. Van Trung, P.. T. T. Huong, D. Van Tuyen. D. M. Duc, N. H. Thanh, and A. Marshall, A multi-criteria-based ddos-attack prevention solution using software defined networking. In Advanced Technologies for Communications (ATC), 2015 International Conference on. IEEE, 2015.
  12. Xiao, Z. and Y. Xiao (2013). Security and privacy in cloud computing. IEEE Conmmunications Surveys & Tutorials, 15(2), 843-859.