2020
DOI: 10.3390/electronics10010006
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for the Attack Tolerance of Cloud Applications Based on Web Services

Abstract: Information systems of companies and organizations are increasingly designed using web services that allow different applications written in different programming languages to communicate. These systems or some parts of them are often outsourced on the cloud, first to leverage the benefits of cloud platforms (e.g., scalability) and also to reduce operational costs of companies as well. However, web services as well as cloud platforms may be the target of attacks that alter their security, and the security of w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 42 publications
0
2
0
1
Order By: Relevance
“…Data duplication is the process of eliminating multiple copies of repeated data 30,32 By making sure the duplication takes place when the correct amount of file copies is required, this assault is lessened. Application‐based attacks : The application running in the cloud may experience a number of attacks that degrade its functionality and result in the disclosure of information for nefarious intentions. Malware infusion and stenography attacks, shared designs, online services, and convention‐based attacks are the three main applications‐based threats 57 …”
Section: Threats In Cloud Computingmentioning
confidence: 99%
“…Data duplication is the process of eliminating multiple copies of repeated data 30,32 By making sure the duplication takes place when the correct amount of file copies is required, this assault is lessened. Application‐based attacks : The application running in the cloud may experience a number of attacks that degrade its functionality and result in the disclosure of information for nefarious intentions. Malware infusion and stenography attacks, shared designs, online services, and convention‐based attacks are the three main applications‐based threats 57 …”
Section: Threats In Cloud Computingmentioning
confidence: 99%
“…Literatürdeki çalışmaların çoğu belirli bir saldırı tipine yönelik yapılmış olup, web hizmetlerinin saldırı toleransları açıkça ortaya konmamıştır. Çalışmada [3] çeşitlendirme ve yansıtma tekniklerine dayalı, risk analizi de içeren bir saldırı tolerans çerçevesi sunulmuştur. Uygulama güvenliği kapsamında yapılan bir diğer çalışmada [4] ise uygulama tasarımı aşamasında kullanılmak üzere, bulut güvenlik metriklerini de içerecek şekilde çalışabilen bir risk değerlendirme çerçevesi sunulmuştur.…”
Section: Uygulama Güvenliği (Application Security)unclassified
“…Other diversity solutions may work also in a detection-reaction manner. For example, Ouffoué et al [110,178] use diversification to create attack tolerant web services. They modeled the services to extract different implementations using variation in style, encoding, and language.…”
mentioning
confidence: 99%