Session Hijacking Over Cloud Environment: A Literature Survey

Session Hijacking Over Cloud Environment: A Literature Survey

Thangavel M., Pandiselvi K., Sindhuja R.
Copyright: © 2019 |Pages: 30
ISBN13: 9781522581765|ISBN10: 1522581766|EISBN13: 9781522581772
DOI: 10.4018/978-1-5225-8176-5.ch097
Cite Chapter Cite Chapter

MLA

M., Thangavel, et al. "Session Hijacking Over Cloud Environment: A Literature Survey." Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 1984-2013. https://doi.org/10.4018/978-1-5225-8176-5.ch097

APA

M., T., K., P., & R., S. (2019). Session Hijacking Over Cloud Environment: A Literature Survey. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 1984-2013). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch097

Chicago

M., Thangavel, Pandiselvi K., and Sindhuja R. "Session Hijacking Over Cloud Environment: A Literature Survey." In Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1984-2013. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8176-5.ch097

Export Reference

Mendeley
Favorite

Abstract

Cloud computing is a technology that offers an enterprise model to provide resources made available to the client and network access to a shared pool of configurable computing resources and pay-for-peruse basis. Generally, a session is said to be the collective information of an ongoing transaction. This package is typically stored on the server as a temporary file and labeled with an ID, usually consisting of a random number, time and date the session was initiated. That session ID is sent to the client with the first response, and then presented back to the server with each subsequent request. This permits the server to access the stored data appropriate to that session. That, in turn allows each transaction to be logically related to the previous one. Session hijacking is the common problem that is experienced in the cloud environment in which the session id is gained and information is gathered using the session ID compromising its security. This chapter covers session hijacking and the countermeasures to prevent session hijacking.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.