Open Access Open Access  Restricted Access Subscription Access

Attacks Surfaces and Attacks in Cloud Computing

Usvir Kaur, Manish Mahajan, Dheerendra Singh


Cloud computing is changing the shape of a business industry by providing resources in shareable, scalable, elasticity manner. It resembles with the concept of a distributed system and uses the basis of networking. This leads to the vulnerability to different security attacks. This paper discusses various types of surface attacks which presents the participation of various entities in the attack. Various types of attacks, their target area and defense measured are studied.

Cite this Article

Usvir Kaur, Manish Mahajan, Dheerendra Singh. Attacks Surfaces and Attacks in Cloud Computing. Journal of Operating Systems Development & Trends. 2018; 5(3): 6–9p.


Cloud Computing, Attack, Attack Surfaces

Full Text:



Jensen M, Schwenk J, Gruschka N, et al. On technical security issues in cloud computing. Proceedings of the 2009 IEEE International Conference on Cloud Computing (CLOUD-II); 2009 Sept 21–25; Bangalore, India, IEEE; 2009. 109–116.

Liu F, Tong J, Mao J, et al. NIST Cloud Computing Reference Architecture. National Institute of Standards and Technologies Special Publication (500–292), 2012 Sept.

Grobauer B, Walloschek T, Stocker E. Understanding Cloud Computing Vulnerabilities. IEEE Security Privacy. 2011; 9(2): 50–57p.

Pearson S. Taking Account of Privacy when Designing Cloud Computing Services. ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009 May 23, Vancouver, Canada.2009.

Karger PA. I/O for Virtual Machine Monitors: Security and Performance Issues. IEEE Security and Privacy, 2008; 6(5): 16–23p.

Singh A, Shrivastava M. Overview of Attacks on Cloud Computing. International of Engineering and Innovative Technology. 2012; 1(4):321–3p.

Deshmukh RV, Devadkar KK. Understanding DDoS Attack & Its Effect in Cloud Environment Procedia Computer Science. 2015; 49: 202–8p.

Samuel O. Shah MA, Hayat A. Cloud Computing: Attacks and Defenses. International Journal of Scientific & Engineering Research. 2015; 6(4):745–751p.

Luo Q, Fei Y. Algorithmic Collision Analysis for Evaluating Cryptographic System and Side-Channel Attacks. Proceedings of the International Symposium on Hardware Oriented Security and Trust; 2011 June 5–6; California, USA, IEEE; 2011. 75–80p.

Gruschka N, Jensen M. Attack Surfaces: A Taxonomy for Attacks on Cloud Services.Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing; 2010 July 5-10; Miami, USA, IEEE; 2010. 276–279p.

Brumley D. invisible intruders: rootkits in practice.THE usenix MAGAZINE, 2015 April; 40(2): 69–71p.

Dillon T, Wu C, Chang E. Cloud Computing: Issues and Challenges. Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA); 2010 April 20–23; Perth, WA, Australia. USA: IEEE Computer Society Washington, DC; 2010. 27–33p.

Fowler G, Worthen B. The Internet Industry is on a Cloud – Whatever That May Mean. The Wall Street Journal, 2018 September 22.

Jansen W, Grance T. Guidelines on Security and Privacy in Public Cloud Computing. Special Publication SP, National Institute of Standards & Technology, Gaithersburg, MD, United States. 2011 Dec; 800–144p.

Mell P. Nist presentation on effectively and securely using the cloud computing paradigm. 2009 Oct; Available from:

Douligeris C, Mitrokotsa A. DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks: The International. Journal. Computer and Telecommunications Networking, 2004; 44(5):643–666p.


  • There are currently no refbacks.