Vulnerability Assessment and Penetration Testing Approach Towards Cloud-Based Application and Related Services

Authors

  • Anjani Tiwari  School of Information Technology, Artificial Intelligence and Cyber Security, Rashtriya Raksha University, Gandhinagar, Gujarat, India
  • Dr. Priyanka Sharma  School of Information Technology, Artificial Intelligence and Cyber Security, Rashtriya Raksha University, Gandhinagar, Gujarat, India

DOI:

https://doi.org//10.32628/IJSRSET218346

Keywords:

Data Breaches, Cloud Security, Cloud Vulnerability Assessment, Cloud Service Model Security Analysis.

Abstract

Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.

References

  1. Lo'ai, A. T., & Saldamli, G. (2019). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences.
  2. Mosca, P., Zhang, Y., Xiao, Z., & Wang, Y. (2014). Cloud security: Services, risks, and a case study on amazon cloud services. Int'l J. of Communications, Network and System Sciences, 7(12), 529.
  3. Länger, T., Pöhls, H. C., & Ghernaouti, S. (2016, September). Selected cloud security patterns to improve end user security and privacy in public clouds. In Annual Privacy Forum (pp. 115-132). Springer, Cham.
  4. Raghavendra, G. S., D. R. N. S. Lakshmi, and S. Venkateswarlu. "Security issues and trends in cloud computing." International Journal of Computer Science and Information Technologies (IJCSIT) 6.2 (2015): 1156-1159.
  5. Singh, Jitendra. "Cyber-attacks in cloud computing: A case study." International Journal of Electronics and Information Engineering 1.2 (2014): 78-87.
  6. “Sony Still Digging Its Way Out of Breach Investigation, Fallout” https://www.darkreading.com/attacks-breaches/sony-still-digging-its-way-out-of-breach-investigation-fallout/d/d-id/1135653?
  7. "The NIST definition of cloud computing", Special Publication 800-145, National Institute of Standards and Technology, http://csrc.nist.gov/ publications/ PubsSPs.html#800145.
  8. Xiao, Z. and Xiao, Y. (2013) Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, 15, 843-859.
  9. Alruwaili, Fahad F., and T. Aaron Gulliver. "Secure migration to compliant cloud services: A case study." Journal of information security and applications 38 (2018): 50-64.
  10. A. Hutchings, R. G. Smith, and L. James, “Criminals in the Cloud: Crime, Security Threats, and Prevention Measures,” in Cybercrime Risks and Responses, London: Palgrave Macmillan UK, 2015, pp. 146–162
  11. OWASP Cloud Security Project. Available online: https://owasp.org/www-project-cloud-security/
  12. Subramaniam, T. K., and B. Deepa. "Security attack issues and mitigation techniques in cloud computing environments." International Journal of UbiComp (IJU) 7.1 (2016).
  13. Lo'ai, A. Tawalbeh, and Gokay Saldamli. "Reconsidering big data security and privacy in cloud and mobile cloud systems." Journal of King Saud University-Computer and Information Sciences (2019).
  14. Li, Huan-Chung, et al. "Analysis on cloud-based security vulnerability assessment." 2010 IEEE 7th International Conference on E-Business Engineering. IEEE, 2010.
  15. Nabeel, K, Al-Yasiri A (2018) Cloud security threats and techniques to strengthen cloud computing adoption framework. In: Cyber security and threats: concepts, methodologies, tools, and applications. IGI Global, pp 268–285

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Anjani Tiwari, Dr. Priyanka Sharma, " Vulnerability Assessment and Penetration Testing Approach Towards Cloud-Based Application and Related Services, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 3, pp.395-403, May-June-2021. Available at doi : https://doi.org/10.32628/IJSRSET218346