FYU 018-0: Cloud Computing Security Challenges, Semester 2 Project
VerifiedAdded on 2023/06/09
|17
|362
|262
Report
AI Summary
This report provides an overview of security issues in cloud computing, starting with a definition of cloud computing and its features, followed by types of clouds and service models. It then delves into specific security concerns, categorized as data-related (data breaches, lock-in, remanence, recovery, locality), application-related (malware injection, cookie poisoning, backdoor vulnerabilities, hidden field manipulation), CSP-level attacks (guest hopping, SQL injection, malicious insiders, side-channel attacks), and network-level attacks (DNS attacks, cross-site scripting, IP spoofing, DoS attacks, man-in-the-middle attacks, network sniffing). The report also outlines security requirements for cloud computing, including identification, authenticity, authorization, non-repudiation, and availability, and concludes with a discussion of challenges such as security, costing and charging models, service level agreements, and cloud interoperability.
1 out of 17