A Survey: Threats and Vulnerabilities in Cloud

A Survey: Threats and Vulnerabilities in Cloud

Srishti Sharma (The NorthCap University, India) and Yogita Gigras (The Northcap University, India)
Copyright: © 2017 |Pages: 11
DOI: 10.4018/978-1-5225-2154-9.ch006
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The cloud computing field is an emerging field and continuously growing at a fast pace. The data stored on the public cloud is not safe as the attackers can hack or gain unauthorized access to the data and can modify its contents to harm the organizations and the users as well. They pose security threats and risks at various levels. These threats need to be removed and security actions need to be taken at right time to protect the cloud data and resources from being misused by the attackers. Some of the security measures are summarized in order to protect the data.
Chapter Preview
Top

Background

Aspects of Cloud Computing

The important facets or characteristics discussed in (Ali, M., U. Khan, S.U., Vasilakos, A.V. 2015) of cloud computing are as follows that offers numerous benefits to its customers are described below-

  • On-Demand Self Service: Customers can directly request and manage the services (they need) from the cloud. There is no need to interact with the cloud service providers for requesting the resources. This is accomplished by employing web services and management interfaces.

  • Ubiquitous Network Access: Customers access the services and their applications and data present on the cloud using some standard mechanisms and protocols. It provides a broad network access which ensures that the services made available to the users on the cloud should support any type of platform(for example, mobile phones, laptops, workstations, tablets etc). The services and data are available from anywhere and at anytime.

  • Resource Pooling: The resources on the cloud are manifold and can be shared among numerous and varied customers in a multi-tenant environment. Customer generally has no command or knowledge over the exact location of the resources but may specify location at higher level of abstraction (example, country, state or data center).

  • Rapid Elasticity: The resources can be rapidly and elastically provisioned according to customer’s demands. In some cases it can be automatically done, to quickly scale out and rapidly released to quickly scale in. Resources available for provisioning are unlimited and can be purchased in any quantity at any time.

  • Measured Service: The cloud environment provides the usage of various resources and services which are reported to customers and the CSP. The metering process offers the ability to automatically optimize the use of resources and also, the customers have to pay only for those resources which are used by them. It allows resources to be used in pay-as-you-use manner.

  • Multi-Tenancy: This property allows multiple customers (that may or may not belong to the same organization) to use a single resource.

  • Service Models: There are three categories of services provided by cloud computing namely- Software as a service(SAAS), infrastructure as a service(IAAS), and Platform as a service(PAAS).

Complete Chapter List

Search this Book:
Reset