ComputationWorld 2017
February 19 - 23, 2017 - Athens, Greece

  • SERVICE COMPUTATION 2017, The Ninth International Conferences on Advanced Service Computing
  • CLOUD COMPUTING 2017, The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2017, The Ninth International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2017, The Ninth International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2017, The Ninth International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2017, The Ninth International Conference on Creative Content Technologies
  • PATTERNS 2017, The Ninth International Conferences on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2017, The Eighth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2017, The Seventh International Conference on Business Intelligence and Technology

DigitalWorld 2017
March 19 - 23, 2017 - Nice, France

  • ICDS 2017, The Eleventh International Conference on Digital Society and eGovernments
  • ACHI 2017, The Tenth International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2017, The Ninth International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2017, The Ninth International Conference on eHealth, Telemedicine, and Social Medicine
  • DIGITAL HEALTHY LIVING 2017, A Multidisciplinary View on Digital Support for Healthy Living and Self-management for Health
  • MATH 2017, The International Symposium on Mobile and Assistive Technology for Healthcare
  • eLmL 2017, The Ninth International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2017, The Ninth International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2017, The Second International Conference on Advances in Sensors, Actuators, Metering and Sensing

NexComm 2017
April 23 - 27, 2017 - Venice, Italy

  • ICDT 2017, The Twelfth International Conference on Digital Telecommunications
  • SPACOMM 2017, The Ninth International Conference on Advances in Satellite and Space Communications
  • ICN 2017, The Sixteenth International Conference on Networks
  • SOFTNETWORKING 2017, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
  • ICONS 2017, The Twelfth International Conference on Systems
  • MMEDIA 2017, The Ninth International Conferences on Advances in Multimedia
  • PESARO 2017, The Seventh International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2017, The Tenth International Conference on Communication Theory, Reliability, and Quality of Service
  • COCORA 2017, The Seventh International Conference on Advances in Cognitive Radio
  • ALLDATA 2017, The Third International Conference on Big Data, Small Data, Linked Data and Open Data
  • KESA 2017, The International Workshop on Knowledge Extraction and Semantic Annotation
  • SOFTENG 2017, The Third International Conference on Advances and Trends in Software Engineering

 


ThinkMind // CLOUD COMPUTING 2010, The First International Conference on Cloud Computing, GRIDs, and Virtualization // View article cloud_computing_2010_5_30_50067


Exploitation of Vulnerabilities in Cloud Storage

Authors:
Narendran Calluru Rajasekar
Chris Imafidon

Keywords: cloud storage; security; architecture; vulnerabilities

Abstract:
The paper presents the vulnerabilities of cloud storage and various possible attacks exploiting these vulnerabilities that relate to cloud security, which is one of the challenging features of cloud computing. The attacks are classified into three broad categories of which the social networking based attacks are the recent attacks which are evolving out of existing technologies such as P2P file sharing. The study is extended to available defence mechanisms and current research areas of cloud storage. Based on the study, simple cloud storage is implemented and the major aspects such as login mechanism, encryption techniques and key management techniques are evaluated against the presented attacks. The study proves that the cloud storage consumers are still dependent on the trust and contracts agreed with the service provider and there is no hard way of proven defense mechanisms against the attacks.

Pages: 122 to 127

Copyright: Copyright (c) IARIA, 2010

Publication date: November 21, 2010

Published in: conference

ISSN: 2308-4294

ISBN: 978-1-61208-106-9

Location: Lisbon, Portugal

Dates: from November 21, 2010 to November 26, 2010

SERVICES CONTACT
2010 - 2015 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.