Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework

Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework

Jitendra Singh
Copyright: © 2021 |Pages: 15
DOI: 10.4018/IJCWT.2021100103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.
Article Preview
Top

Introduction

Cloud computing has proved to be a revolutionary paradigm of 21st century. A large number of users irrespective of their size, budget, and geographic locations are subscribing to this paradigm(Singh, 2016). Growing spending on cloud highlights the promising growth level attained by cloud paradigm. Major research and Analysis Companies have predicted the cloud as the prominent paradigm of the decade. According to Gartner, a research and analysis company predicted that this paradigm will continue to maintain a robust growth rate of 17.3 percent in the future (Gartner, 2018). All sizes of organizations that include small, medium, and large are embracing this promising paradigm in one form or the other. Amazon web services, Windows Azure, Google application engine, IBM cloud, Oracle cloud, Zoho, salesforce, etc. are some of the leading cloud providers holding the substantial market share(Singh, 2017).

Cloud Architecture And Offerings

Cloud resources are provisioned from the data center, and the same is used by the cloud subscribers. Cloud data centers are instrumental in offering the cloud resources, and also facilitate the subscribers in carrying out their task. Based on the deployment model, cloud paradigm can be categorized into private, public, hybrid and community cloud(Mell & Grance, 2011). Private cloud is solely managed by the organization that owes the cloud resources and accessibility boundary is limited within the owner’s organization. Users outside the organizations are not allowed to access the private resources. On the other hand, Public cloud is the other variant of cloud deployment model but it is owned and managed by the cloud provider. In this cloud deployment model, subscribers do not hold any control on resources and they are located outside the subscribers’ organizational boundary. On the other hand, community and hybrid cloud are the other cloud deployment models that bear the features of public and private cloud with customization ability to meet the user’s specific need. Hybrid model is gaining huge popularity among the cloud deployment model, and well suited for the enterprises maintaining the sensitive information that can be critical in terms of privacy and security(Chitturi & Swarnalatha, 2020). But they are aiming to leverage functionalities of the public cloud.

Public cloud is considered to be a true cloud, and assumed to possess the infinite advanced resources that are provisioned in a variety of forms that include virtual hardware resources, system software and application software. According to the category of resources offered, cloud services are categorized into Infrastructure as a service (IaaS), Platform as a services (PaaS), Software as a Services (SaaS), Security as a Services (SecAAS), and anything as a services (XaaS) (Miyachi, 2018). Categorization is solely based on the type of resources offered, for instance in IaaS, computing resources such as microprocessor, Random Access Memory (RAM), and hard disk, etc. are offered for subscription. In PaaS, application development environments including that of visual studio, java environment are offered as a service. In a SaaS environment, application meetings to a specific need such as invoice, ERP, meeting software, etc. are offered as a service. Once subscribers subscribe to any of the services, afterwards they pay on the ‘pay as you go’ model.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing