Hack the Cloud

Author(s):  
Mark Crosbie

The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for hackers to exploit organizations, giving rise to new classes of vulnerability, and new security challenges. The forensic investigator must learn to “think like a hacker” so that they can reconstruct the path the hacker takes through the cloud environment. This chapter will explain how an Ethical Hacker works, how the Ethical Hacker views the Cloud, and in doing so illustrate the new challenges facing a forensic investigator.

2015 ◽  
pp. 1510-1526
Author(s):  
Mark Crosbie

The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for hackers to exploit organizations, giving rise to new classes of vulnerability, and new security challenges. The forensic investigator must learn to “think like a hacker” so that they can reconstruct the path the hacker takes through the cloud environment. This chapter will explain how an Ethical Hacker works, how the Ethical Hacker views the Cloud, and in doing so illustrate the new challenges facing a forensic investigator.


Author(s):  
Ravindra Kumar Singh Rajput ◽  
Dinesh Goyal

Every software application has its own minimum set of requirements like CPU, storage, memory, networking, and power. These have to be integrated into a specific configuration to allow the smooth functioning of the software application. When data traffic becomes higher than expected, higher resources are required. There may not be enough time to provision new resources manually; in such cases, an auto-scaling system is required for managing these situations. Cloud computing means using data, programs, and other resources pooled in the data center and accessed through the internet instead of the user's computer. In the chapter, the authors discussed some aspects related to cloud computing like cloud workload, load balancing, load balancing algorithms, scaling techniques, and auto-scaling to fulfill cloud workload balancing requirements.


2019 ◽  
Vol 16 (2) ◽  
pp. 764-767
Author(s):  
P. Chitra ◽  
Karthika D. Renuka ◽  
K. Senathipathi ◽  
S. Deepika ◽  
R. Geethamani

Cloud computing is the cutting edge technology in the information field to provide services to the users over the internet through web–based tools and applications. One of the major aspects of cloud computing is load balancing. Challenges like Quality of service (QoS) metrics and resource utilization can be improved by balancing the load in cloud environment. Specific scheduling criteria can be applied using load balancing for users prioritization. This paper surveys different load balancing algorithms. The approaches that are existing are discussed and analyzed to provide fair load balancing and also a comparative analysis was presented for the performance of the existing different load balancing schemes.


2015 ◽  
Vol 15 (2) ◽  
pp. 6499-6503
Author(s):  
Abhilasha Abhilasha

Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. Cloud computing is very popular paradigm in the field of computer science where heterogeneous services are delivered to an organization's computer through the Internet. It allows individuals and businesses to access the applications without installation and can access their personal files on any internet connected computer or laptop. Cloud computing means saving and accessing the data over the internet instead of local storage. In this paper, we have conducted a survey on the models of cloud environment, benefits and issues related to it. 


Author(s):  
Hamisu Alhaji Ali

In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry's most developing section. Now that the world economy was hit by recession, the victims of this tragedy continually understand that by just outsourcing or tapping the cloud  resources, a package of virtualise, elastic, instant on-demand provision, and scalable; infrastructure, platform, and software can be access fast and easy inform of services at a negligible amount via the internet. However, as individuals and organizations embarked on the course of deploying their information and data into the cloud, anxieties are beginning to develop on whether the cloud environment is safe. This research provides an overview of the cloud deployment model, the services they offer and discusses the security issues and challenges of cloud computing in both data storage and virtual applications/servers.


2018 ◽  
pp. 910-925
Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


2017 ◽  
Vol 17 (3) ◽  
pp. 165-185 ◽  
Author(s):  
P. Sanyasi Naidu ◽  
Babita Bhagat

Abstract Cloud computing is emerging as a significant new paradigm in the fields of Service-oriented computing, software engineering, etc. The paper aims to characterize the cloud environment and to study the cloud optimization problems. About 50 papers are collected from the standard journals, and it is first reviewed chronologically to find out the contributions in cloud security. After reviewing, the various challenges addressed in the cloud environment and its performance analysis is discussed. In the next section, the exploration of the meta-heuristic study of cloud optimization is done. The algorithms used in the cloud security challenges are discussed and reviewed. The algorithms such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) are exploited for the finding the cloud security problems. As the research outcome, case studies are taken and reviewed. Cloud computing is a vast field, and a lot of problems in it had to be addressed and solved.


2014 ◽  
Vol 484-485 ◽  
pp. 986-990 ◽  
Author(s):  
Xing Chen Jiang ◽  
Jian De Zheng

The cloud computing offers dynamically scalable online resources provisioned as a service over the Internet cheaply. However, the security challenges it poses are equally striking. The reliable user authentication techniques are required to combat the rising security threat in cloud communications. Due to the non-denial requirements of remote user authentication scheme, it is most commonly achieved using some form of biometrics-based method. Fingerprint authentication is one of the popular and effective approaches to allow the only authorized users to access the cryptographic keys. While the critical issue in remote biometric cryptosystem is to protect the template of a user stored in a database. The biometric template is not secure and the stolen templates cannot be revoked, which is easy to leak user identity information. To overcome these shortcomings, in this paper, an indirect fingerprint authentication scheme is proposed. Further, we apply this secure scheme to the cloud system combing with PKI mechanism. At last, a comprehensive and detailed security analysis of the proposed scheme in cloud computing is provided.


Author(s):  
Manju Sharma ◽  
Mukesh Kumar Sharma

Considering the demand of cloud services research has considered the issues or problems related to cloud computing. Various approaches adopted by existing research have limited scope and there is need to increase the security of cloud computing environment. The issues of security threat in cloud environment are explained in this paper. There have been several security threats to cloud environment such as Intrusion, brute force, Sql injection, Trozen horse that could affect the security of cloud services. There remains issue of Un-authentic access. Moreover the identity management is becoming a great challenge. Previous researches have proposed cryptographic approach while some provided solution to hacking attempts along with unauthentic external access but these security mechanisms are not sufficient to protect the cloud. Research paper is introducing intelligent system that is capable to trace the intrusion using LSTM based training model. The model is trained in order to categorize intrusion accordingly. The focus of research is to increase the security from intrusion by providing intelligent LSTM approach. This mechanism would classify the transmission in different categories such as Dos-synflooding, MITM ARP spoofing, Mirai-Ackflooding, Mirai-Http flooding, Mirai-Hostbruteforceg, Mirai-UDP Flooding, scan hostport and Normal. Moreover research paper has focused on prevention of Sql injection attacks. In order to increase the security between sender and receiver research has also allowed two way port based hand shaking in order to transmit data more securely. The transmission would be initiated using default port but the actual transmission would be made using random port that would be set for specific time slot.


Author(s):  
Deepa Bura ◽  
Meeta Singh ◽  
Poonam Nandal

This article describes how cloud computing utilizes the benefits of web engineering and its applications by improving the performance and reducing the load on cloud providers. As the cloud is one of the emerging technology in the field of computing, it is used to provide various services to the user through the internet. One of the major concerns in cloud computing is accessibility of cloud. For estimating the availability of cloud, various load balancing algorithms are deployed in data centers of the cloud environment. Load balancing is a technique that distributes a signal load across various computers for optimizing resource usage, reducing response time, etc. There are different load balancing algorithms, for performing the load distribution across various centers. This article analyses different load balancing algorithms and develop a new algorithm for efficient load balancing. The proposed load balancing algorithm utilizes the concepts of web engineering to prioritize the request of end user using parsing technique, which will assign the resources to the end users based on the priority set by the data centers.


Sign in / Sign up

Export Citation Format

Share Document