Affiliation:
1. School of Information Technology, Artificial Intelligence and Cyber Security, Rashtriya Raksha University, Gandhinagar, Gujarat, India
Abstract
Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.
Reference15 articles.
1. Lo'ai, A. T., & Saldamli, G. (2019). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences.
2. Mosca, P., Zhang, Y., Xiao, Z., & Wang, Y. (2014). Cloud security: Services, risks, and a case study on amazon cloud services. Int'l J. of Communications, Network and System Sciences, 7(12), 529.
3. Länger, T., Pöhls, H. C., & Ghernaouti, S. (2016, September). Selected cloud security patterns to improve end user security and privacy in public clouds. In Annual Privacy Forum (pp. 115-132). Springer, Cham.
4. Raghavendra, G. S., D. R. N. S. Lakshmi, and S. Venkateswarlu. "Security issues and trends in cloud computing." International Journal of Computer Science and Information Technologies (IJCSIT) 6.2 (2015): 1156-1159.
5. Singh, Jitendra. "Cyber-attacks in cloud computing: A case study." International Journal of Electronics and Information Engineering 1.2 (2014): 78-87.