preview

Title: Overview Of Attacks Of Cloud Computing. Name: Bipasha,

Decent Essays

Title: Overview of Attacks of Cloud Computing Name: Bipasha, Tahmina Akter Id: 13-23131-1 Email: tahpasha@gmail.com Introduction: Cloud computing as a new illustration of information technology that offers remarkable advantages in an economic perspective, such as reduced time to market, flexible computing capabilities and limitless computing power. By using the full potential of cloud computing, data are transferred, processed and stored by external cloud providers. The NIST (National Institute of Standards and Technology: is the federative technology agency that works with industry to develop and apply technology, measurements, and standard) definition of cloud computing “Cloud computing is a model for enabling convenient, on-demand …show more content…

Literature Review: According to [3], there are so many security risks of the user of the cloud computing services, for handling these hazards the possible types of attacks must be categorized so that the solution of that can be found [4]. The author has proposed the idea of attacks possible in the cloud computing. The organizations are providing cloud services according to the cloud computing categorization. The cloud computing is still not matured in terms of security, and most of the researchers in published literature focused on security and new categorization of the attack surface. The paper focused on the initial attacks and hacking efforts linked to cloud computing organizations and their systems. In the cloud computing, there are three different contributor classes as a user, the cloud, and service. In cloud computing, two contributors must involve in the communication. The attacks can be launched on any of these three contributors during communication. The contributor classes must be secured with a security interface or a channel between the communicating parties, which depends on the service model that the cloud have like IaaS, PaaS, and SaaS. Denial of Service (DOS) or Distributed Denial of Service (DDOS) is one of the biggest security risks in cloud computing as well as any other internet based services. DOS or DDOS generally functions by the attacker sending large amounts of data packets, such as simple TCP/UDP or really any other

Get Access