Reference Hub2
Security of the Cloud

Security of the Cloud

Khalid Al-Begain, Michal Zak, Wael Alosaimi, Charles Turyagyenda
Copyright: © 2015 |Pages: 42
ISBN13: 9781466682139|ISBN10: 1466682132|EISBN13: 9781466682146
DOI: 10.4018/978-1-4666-8213-9.ch012
Cite Chapter Cite Chapter

MLA

Al-Begain, Khalid, et al. "Security of the Cloud." Emerging Research in Cloud Distributed Computing Systems, edited by Susmit Bagchi, IGI Global, 2015, pp. 363-404. https://doi.org/10.4018/978-1-4666-8213-9.ch012

APA

Al-Begain, K., Zak, M., Alosaimi, W., & Turyagyenda, C. (2015). Security of the Cloud. In S. Bagchi (Ed.), Emerging Research in Cloud Distributed Computing Systems (pp. 363-404). IGI Global. https://doi.org/10.4018/978-1-4666-8213-9.ch012

Chicago

Al-Begain, Khalid, et al. "Security of the Cloud." In Emerging Research in Cloud Distributed Computing Systems, edited by Susmit Bagchi, 363-404. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-8213-9.ch012

Export Reference

Mendeley
Favorite

Abstract

The chapter presents current security concerns in the Cloud Computing Environment. The cloud concept and operation raise many concerns for cloud users since they have no control of the arrangements made to protect the services and resources offered. Additionally, it is obvious that many of the cloud service providers will be subject to significant security attacks. Some traditional security attacks such as the Denial of Service attacks (DoS) and distributed DDoS attacks are well known, and there are several proposed solutions to mitigate their impact. However, in the cloud environment, DDoS becomes more severe and can be coupled with Economical Denial of Sustainability (EDoS) attacks. The chapter presents a general overview of cloud security, the types of vulnerabilities, and potential attacks. The chapter further presents a more detailed analysis of DDoS attacks' launch mechanisms and well-known DDoS defence mechanisms. Finally, the chapter presents a DDoS-Mitigation system and potential future research directions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.