2020
DOI: 10.4018/978-1-7998-1082-7.ch007
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats and Recent Countermeasures in Cloud Computing

Abstract: The cloud is an appealing innovation that has driven, in record time, an extraordinary interest. It is right now one of the busiest regions of research in IT, due to its adaptability, vigor, and capacity to altogether lessen the expenses of administrations to clients on the web. Additionally, cloud stores all client information in server farms dispersed the world over. In this manner, security has turned into a foremost worry that anticipates numerous organizations to receive its administrations. Clients shoul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Around USD 1 million Dropbox [56] End users and their security settings A total of 68 million user accounts were hacked Unknown Home Depot [57] An attack exploited the Home Depot's point-ofsale terminals Information from 56 million credit cards was stolen Over USD 100 million National Electoral Institute of Mexico [58] Unsecured data were published online A total of 93 billion voter registration records were compromised unknown Uber [59] Vulnerable Creepy Stalk version 57 million users' data and 60 million drivers' license information were exposed USD 148 million Yahoo [60] Session Hijack 3 billion user accounts hacked USD 4.5 million LinkedIn [61] Network Scraping A total of 700 million user accounts posted for sale on the dark web USD 5 million Microsoft [62] The breach occurred due to a misconfiguration in one of Microsoft's cloud databases, which left the data exposed without proper access controls Sensitive data of over 38 million Microsoft users were exposed, including email addresses, account IDs, and support case details $ unknown TBC Corporation [63] Misconfigured AWS S3 Bucket Approximately 17,000 customer records, including personally identifiable information (PII), such as names, addresses, and phone numbers Est. USD 1.5 million Volkswagen Group of America [64] Exposed Elasticsearch cluster Over 3.3 million records, including customer information and internal data, were exposed.…”
Section: Yearmentioning
confidence: 99%
“…Around USD 1 million Dropbox [56] End users and their security settings A total of 68 million user accounts were hacked Unknown Home Depot [57] An attack exploited the Home Depot's point-ofsale terminals Information from 56 million credit cards was stolen Over USD 100 million National Electoral Institute of Mexico [58] Unsecured data were published online A total of 93 billion voter registration records were compromised unknown Uber [59] Vulnerable Creepy Stalk version 57 million users' data and 60 million drivers' license information were exposed USD 148 million Yahoo [60] Session Hijack 3 billion user accounts hacked USD 4.5 million LinkedIn [61] Network Scraping A total of 700 million user accounts posted for sale on the dark web USD 5 million Microsoft [62] The breach occurred due to a misconfiguration in one of Microsoft's cloud databases, which left the data exposed without proper access controls Sensitive data of over 38 million Microsoft users were exposed, including email addresses, account IDs, and support case details $ unknown TBC Corporation [63] Misconfigured AWS S3 Bucket Approximately 17,000 customer records, including personally identifiable information (PII), such as names, addresses, and phone numbers Est. USD 1.5 million Volkswagen Group of America [64] Exposed Elasticsearch cluster Over 3.3 million records, including customer information and internal data, were exposed.…”
Section: Yearmentioning
confidence: 99%
“…Live migration poses security threats such as DoS, Man-in-the-Middle-Attack, overflow attack and Reply attack. Cryptography, Authentication, Integrity and Authorization are recommended mitigation techniques [43].…”
Section: Vm Migrationmentioning
confidence: 99%
“…Dawoud et al (2016) put forth a framework that is based on a trusted cloud authority to provide confidentiality as well for the data hosted on cloud services. Further, many other researchers have studied the security threats of cloud computing (Sabahi, 2011;Krutz and Vines, 2010;Xiao and Xiao, 2013;Mishra et al, 2020;Kolawole et al, 2019;Aljumah and Ahanger, 2020).…”
Section: Related Workmentioning
confidence: 99%