A Defensive Measure of Cloud Server Security with Brief Solution

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-29 Number-1
Year of Publication : 2015
Authors : Sultan Anwar, Abdullah Al Mamun, Hassan Ali


Sultan Anwar, Abdullah Al Mamun, Hassan Ali "A Defensive Measure of Cloud Server Security with Brief Solution". International Journal of Computer Trends and Technology (IJCTT) V29(1):1-8, November 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
the cloud computing is one of the rapid growing technology in IT industry during the past couple of years. Customers can access their data from anywhere in the world by using internet. Many of the large companies are offering cloud services nowadays. Security and protection of user data and processes is one of the major concerns in the cloud computing environment. This paper provides a brief introduction of cloud computing, various aspects of cloud model as well as service layers, security threats and challenges. Also provides a comprehensive classification of different threats with respect to various levels of cloud servers. This paper also aims to explore the underlying server level attacks and its defensive measures to cope with them. The security of the cloud computing environment requires further development and improvement by both industrial and academic researchers.

[1] A. Kundu, C. D. Banerjee, P. Saha, Introducing New Services in Cloud Computing Environment, International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-152, 2010.
[2] Rabbani, Imran M., Abad A. Shah, and Muhammad Aslam. ”Evolution of Cloud Computing and its Future.”
[3] Perry, G., Minimizing public cloud disruptions, Tech Target, [online]. Available at: http://searchdatacenter.techtarget.com/tip/Minimizingpubliccloud- disruptions, 2011.
[4] Kanday, Rajeev. ”A survey on cloud computing security.” Computing Sciences (ICCS), 2012 International Conference on. IEEE, 2012.
[5] http://searchservervirtualization.techtarget.com/definition/virt ualization (accessed in May 2015)
[6] Parameshwari, V., et al. ”Cloud ComputingAn Advanced Study Using ANFIS.”Int. J. Novel. Res. Eng & Pharm. Sci 1.04: 24-28. 2014
[7] http://wwwimages.adobe.com/content/dam/Adobe/en/products /acrobat/pdfs/acrobatX it challenge.pdf, iTs next challenge: Three key trends in document collaboration and exchange Meeting knowledge workers demands in 2011 and beyond, 2011, pp.1
[8] Allan A. Friedman and Darrell M. West Privacy and Security in Cloud Computing Issues in Technology Innovation the Center for Technology Innovation at Brookings 2010. [9] Pearson, S., Toward Accountability in the Cloud Internet Computing, IEEE, 2011.
[10] Nakahara, S.; Ishimoto, H. A study on the requirements of accountable cloud services and log management Information and Telecommunication Technologies (APSITT), 2010 8th Asia-Pacific Symposium, 2010.
[11] Gehana Booth, Andrew Soknacki, and Anil Somayaji, Cloud Security: Attacks and Current Defenses, 8th Annual Symposium On Information Assurance (Asia13), June 4-5, Albany, New York , 2013, pp.56-62.
[12] K. Vieira, A. Schulter, C. B. Westphall, and C. M.Westphall, Intrusion Detection for Grid and Cloud Computing, IEEEComputer Society, Vol. 12, July/August 2010, pp.38-43.
[13] Anindita Saha1, Abhijit Das A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 5, Sep-Oct. 2012, PP 11- 18.
[14] Rohit Bhadauria and Sugata Sanyal,Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques., International Journal of Computer Applications 47(18) , June 2012, pp:47-66
[15] N Jeyanthi, N.Ch.S.N Iyengar, P C Mogan Kumar, Kannammal A 2013 An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment, International Journal of Communication Networks and Information Security, Vol. 5, No. 2, pp. 163-173.
[16] S. Roschke, F. Cheng, and C.Meinel,Intrusion Detection in Cloud, 8th IEEE International Conference on Dependable, Automatic and Secure Computing, pp.729 734.
[17] Jeyanthi, N. , Iyengar, N.Ch.S.N. 2012, ”Packet resonance strategy: A spoof attack detection and prevention mechanism in cloud computing environment”, International Journal of Communication Networks and Information Security, Vol. 4, No. 3, pp. 163-173
[18] Upma Goyal, Gayatri Bhatti and Sandeep Mehmi, A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model, International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 3, March 2013.
[19] Ristenpart, Thomas, et al. ”Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.” Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009.
[20] Padhy, Rabi Prasad, Manas Ranjan Patra, and Suresh Chandra Satapathy. ”Cloud Computing: Security Issues and Research Challenges.” International Journal of Computer Science and Information Technology & Security (IJCSITS) 1.2 (2011): 136-146.
[21] Gary C. Kessler Defenses Against Distributed Denial of Service Attacks, 4th edition of the Computer Security Handbook, November 2000
[22] http://pages.arbornetworks.com/rs/arbor/images/WISR2012 EN.pdf, Worldwide Infrastrucutre Security Report, vol 8, [2012] (accessed in May 2015)
[23] Sina Manavi, Sadra Mohammadalin, Nur Izura Udzir, Azizol Abdullah, Hierarchical Secure Virtualization Model for Cloud. In the Proceeding of the International Conference on Cyber Security, Cyber Warfare And Digital Forensic (Cybersec2012), pp 219-224,IEEE, June 2012.
[24] M. Laureano, C. Maziero, and E. Jamhour, Protecting hostbased intrusion detectors through virtual machines, Computer Networks, vol. 51, no. 5, pp. 1275-1283, Apr. 2007.
[25] S. Ros, F. Cheng, and C. Meinel, Intrusion Detection in the Cloud, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 729-734, Dec. 2009.
[26] F. Azmandian, M. Moffie, and M. Alshawabkeh, Virtual machine monitor-based lightweight intrusion detection, ACM SIGOPS, vol. 45, no. 2, p. 38, Jul. 2011.
[27] Radwane Saad, Farid Nait-Abdesselam and Ahmed Serhrouchni, A Collaborative Peer-to-Peer Architecture to Defend Against DDoS Attacks. In 33rd IEEE conference on local computer network, pp. 427- 434, IEEE, September 2008
[28] Sebastian Roshke, Feng Cheng, Christoph Meinel, Intrusion Detection in the Cloud. In Eighth IEEE International Conference on Dependable,Autonomic and Secure Computing, pp. - 729-734, IEEE, October 2009
[29] Ping Du, Akihiro Nakao, DDoS Defense as a Network Service. In International Conference on Network Operations and Management Symposium, pp.-894-897, IEEE, April 2010
[30] Qi Chen, Wenmin Lin, Wanchun Dou, Shui Yu, CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment, In Ninth International Conference on Dependable, Autonomic and Secure Computing, pp.-427-434, IEEE, Jan 2011
[31] Yang, Lanjuan, et al. ”Defense of DDoS attack for cloud computing.” Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on. Vol. 2. IEEE, 2012.
[32] Hisham A. Kholidy, Fabrizio Baiardi, CIDS: A framework for Intrusion Detection in Cloud Systems. In Ninth InternationalConference on Information Technology-New Generation, pp. 379-385, October 2012

Cloud Service Provider (CSP), Intrusion Detection System (IDS), Domain Name Server (DNS), Distributed Denial of Service (DDOS), Border Gateway Protocol (BGP).