Defensive Countermeasures Towards Addressing Cloud Security Attacks

D Saxena, S Rekha - Authorea Preprints, 2023 - techrxiv.org
The multi-tenant resource-sharing environment of cloud computing among multiple users
and vulnerabilities of virtual machines (VM) s and physical machines prompt unauthorized …

Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable?

M Ficco - Information Sciences, 2019 - Elsevier
Cloud paradigm is vulnerable to emerging breeds of fraudulent energy-related threats,
which seek to exploit the cloud elasticity and the multi-tenant model. Recently, several …

Cloud security threats and techniques to strengthen cloud computing adoption framework

N Khan, A Al-Yasiri - Cyber security and threats: Concepts …, 2018 - igi-global.com
Cloud Computing allows firms to outsource their entire information technology (IT) process,
allowing them to concentrate more on their core business to enhance their productivity and …

Security and privacy issues in cloud computing

AA Ouahman - Journal of Defense Resources Management (JoDRM), 2014 - ceeol.com
Today, cloud computing is defined and talked about across the ICT industry under different
contexts and with different definitions attached to it. It is a new paradigm in the evolution of …

Attacks in public clouds: Can they hinder the rise of the cloud?

S Shafieian, M Zulkernine, A Haque - Cloud Computing: Challenges …, 2014 - Springer
Since the advent of Cloud Computing, security has been one of the main barriers to the
adoption of the Cloud paradigm, especially by large organizations dealing with customers' …

Pileus: Protecting user resources from vulnerable cloud services

Y Sun, G Petracca, X Ge, T Jaeger - … of the 32nd Annual Conference on …, 2016 - dl.acm.org
Cloud computing platforms are now constructed as distributed, modular systems of cloud
services, which enable cloud users to manage their cloud resources. However, in current …

A large-scale study on the security vulnerabilities of cloud deployments

AC Iosif, TE Gasiba, T Zhao, U Lechner… - … on Ubiquitous Security, 2021 - Springer
As cloud deployments are becoming ubiquitous, the rapid adoption of this new paradigm
may potentially bring additional cyber security issues. It is crucial that practitioners and …

Resource Targeted Cybersecurity Attacks in Cloud Computing Environments

GK Saini, G Somani - Resource Management in Distributed Systems, 2024 - Springer
Cloud services give opportunity to use computing as a utility. Cloud infrastructures have an
ability to provide resources to its users on demand. These abilities of cloud draw the …

Cloud Ecosystem-Prevalent Threats and Countermeasures

S Idrees, S Nazir, S Tahir, MS Khan - Handbook of Research on …, 2023 - igi-global.com
Cloud-based services are in high demand because they give consumers and businesses a
lot of flexibility in employing new applications and high-end infrastructure at a low cost …

Using virtual machine allocation policies to defend against co-resident attacks in cloud computing

Y Han, J Chan, T Alpcan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloud computing enables users to consume various IT resources in an on-demand manner,
and with low management overhead. However, customers can face new security risks when …