Cloud computing is predicted to be the future technology. This paradigm is considered to be offering infinite resources and comprehensive security, due to the application of modern techniques and highly skilled personnel employed. Despite of highly skilled manpower is looking after the cloud; cybercriminals have managed to attack cloud. This work undertakes the study of threats that exist in cloud computing, the type of industries on target of cybercriminals. In addition, we have carried out the detailed study on the industries which are targeted and the method employed by the cybercriminals to target these industries. This work will be extremely helpful to researchers and enterprises to know the type of cyber attack occurring in this newly evolved paradigm and to evolve the new methods to counter them.
Keywords
Cyber security, cloud attack, cybercrime, resource protection
1 Introduction
Enterprises and individual users are outsourcing their services on the web, instead of maintaining the resources of their own. Outsourcing of technical resources enables the organization to concentrate on business need instead of technical aspect, which is looked after by the expert of the IT area. To facilitate such users, a web based paradigm known as cloud computing has emerged and offering the services on utility model [p3]. The major goal of Cloud computing is to reduce the operating cost, increase throughput, increase the reliability and availability [p10].
To cater the wide variety of users, cloud is offering three types of services. These services include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) ( Mell & Grance, 2011). In IaaS users are offered the computing capabilities such as pr...
... middle of paper ...
...0]B. Hayes, Cloud computing, Communications of the ACM 51 (7) (2008).
[p11] Andrzej Goscinski, Michael Brock. Toward dynamic and attribute based publication, discovery and selection for cloud computing. Future Generation Computer Systems 26 (2010) 947-970
[p12] Vaquero L.M., Rodero-Merino L, Caceres J., Lindner M. A break in the clouds: towards a cloud definition. In: ACMSIGCOMM, editor. Computer communication review 2009. New York: ACM Press; 2009. pp. 50–5. (for grid virtualization)
[p13] Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing, 2009. http://www.ibm.com/developerswork/websphere/zones/hipods/ library.html. (for services types)
Mell, P. & Grance, T. (2011), "The NIST definition of cloud computing", special Publication 800-145, National Institute of Standards and Technology, available at http://csrc.nist.gov/ publications/ PubsSPs.html#800-145.
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
Valerdi, Ricardo. "The Cloud Systems." Industrial Engineer n.d.: 28. ABI/INFORM Complete. Web. 1 May 2014. .
A cloud can be a white, puffy object that aimlessly floats hundreds, if not thousands of feet in the air. Or a cloud can be gray and gloomy, signaling imminent showers or thunderstorms. However, the identity of a cloud is beginning to change in the modern era. In the modern era, Microsoft is attempting to redefine a cloud as being a service that electronically stores data from a large variety of sources. In particular, Microsoft advertises their new cloud service, Azure, in Fortune magazine, in an attempt to appeal to businesses that require a cloud service to store data, and to meet their consumer’s needs on the web. Though the most peculiar part of the advertisement is the comparison of weather phenomena and Microsoft’s
The data breach at Target had a massive impact on cyber security. According to Lauren Abdel-Razzaq, we live in a world where consumers don’t even think twice about paying with a credit or debit card or buying items online or with mobile devices (2014). However, data breaches have become a major threat and continue to impact companies all over the world. Companies should take information security as seriously as possible. We don’t live in a perfect world. Anything can happen at any time, even if a company has the most sophisticated security system in place. It is how a company reacts to a data breach that will make or break them.
Rest assured that there are many other cyber crime attack methods that can be employed but, this paper will specifically a...
The first computer ENIAC was invented by Charles Babbage in 18th century. But the real technological advancement of the computers came with the invention of the first four bit microprocessor in 1971. From 1971 till date, in the span of these 40+ years many operating systems came into existence (such as Windows 95, Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages and web languages came into existence ( such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many Multi-National Companies came into existence(such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many more). But Internet is one of the key for the growth of each and every thing mentioned above. Cloud Computing is an emerging concept in which resources of computer infrastructure are provided over the Internet [1]. Cloud computing is a concept in which every device gets connected to the cloud which contains application, platform or Infrastructure or a mixture of them. People of 21st century are more familiar with smart phones rather than anything else. With the advent of phones such as IPhone and Android smartphones, the numbers of people using cloud are increasing substantially. Millions of people are using cloud in the present day scenario and it is equally important to provide the security to all the users who are using it. Cloud computing can be used as a utility to attract many people which can make software attractive as a service [2]. There are several security related issues with cloud which can be discussed in this paper.
To understand how cloud computing can be of value to an organization, it is important to us that we understand the cloud and its components. There are three different types of cloud computing services referred to as Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS). IaaS delivers cloud computing infrastructure servers, storage, network and operating systems as an on-demand service. SaaS is about software deploying over the Internet. PaaS allows a creation of web applications without the complexity of buying and maintaining the software and infrastructure. In this paper, I will suggest that Innovartus Technology Inc should use IaaS as a replacement for PaaS because IaaS is a rapidly developing field with resources such as better services, cost variability, utility pricing model and dynamic scaling.
During the past years a new solution appeared in the IT field, Cloud computing, and it is Impossible to overlook it, in light of the fact that Cloud computing permits organizations to outsource information, electronically mail, folders and different applications through virtual stages through the medium of servers
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
Cloud Computing is one of the predominant and emerging technologies. It provides easy access to the resources from all around the world remotely through internet access .As a result of this all the organizations/business enterprises are looking to take advantage of the cloud technology to make efficient use of resources and minimizing the storage cost. Cloud technology is designed with different type of services like IaaS (Infrastructure as a service),SaaS (Software as a Service),and PaaS (Platform as a Service) for the different type of business /users. Cloud computing is all about storing the files at third party. So, in that terms cloud environment is very unsafe. In spite of weak security measures that are maintained using standard authentication methods, this type of access will be vulnerable and easy for the intruders to breach out the data from the cloud.
The cloud model comprises five essential characteristics are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured services. It also offers main three service models such as software as a service (SaaS),platform as a service (PaaS), and infrastructure as a service (IaaS )and four deployment models are public, private, community, or hybrid. The cloud architecture must illustrate the platform and software compon...
Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. The mass worldwide internet usage growth within the last 20 years has been “an approximate 16 million users in 1995 to an estimated 2,937 million in March of 2014” As the importance of e-commerce increases so does the need to protect the technological infrastructure that will carry out online transactions for each business regardless of its size. I will attempt to highlight and review the history of a few cyber crimes to show the progression of the crimes within the last 30-40 years. I also plan to review how the economy and consumers are impacted by cyber crimes. Finally I will make an effort to contribute with information gathering on how to lower the risk of a cyber attack from and individual user to a large scale business.
The notion of Cloud computing has not only reshaped the field of distributed systems but also undamentally changed how businesses utilize computing today. While Cloud computing provides many advanced features, it still has some shortcomings such as the relatively high operating cost
Prof. Dr. Christof Weinhardt, Dipl.-Inform.-Wirt Arun Anandasivam, Dr. Benjamin Blau,Dipl.-Inform. Nikolay Borissov, Dipl.-Math. Thomas Meinl, Dipl.-Inform.-Wirt Wibke Michalk, Dr. Jochen Stößer "Cloud Computing A Classification, Business Models, and Research Directions - Springer." Cloud Computing A Classification, Business Models, and Research Directions - Springer. Business & Information Systems Engineering, 01 Oct. 2009. Web. 30 June 2014.
Cybercrime refers to all forms of crime conducted through a computer or a mobile device using computer networks. It is thus the use of a computer with the aim of intercepting and manipulating content, disrupting communication, stealing or generally destroying others’ information or hardware through a network. Although cybercrime is a worldwide problem and affects both small and big companies, small companies are affected more from the dangers of cybercrime. The rapid advancement in technology is causing tremendous problems to businesses in terms of more sophisticated cyber-attacks. This project is interesting and beneficial because it enlightens one on the dangers of cybercrime, thus preparing individuals to know how to prevent attacks while online, how to reduce the effects of a cyber-attack and how to prevent future