SoftNet 2016
August 21 - 25, 2016 - Rome, Italy

  • ICSEA 2016, The Eleventh International Conference on Software Engineering Advances
  • ICSNC 2016, The Eleventh International Conference on Systems and Networks Communications
  • CENTRIC 2016, The Ninth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2016, The Eighth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2016, The Eighth International Conference on Advances in System Simulation
  • SOTICS 2016,The Sixth International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2016, The Fifth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2016, The First International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NexTech 2016
October 9 - 13, 2016 - Venice, Italy

  • UBICOMM 2016, The Tenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2016, The Tenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2016, The Tenth International Conference on Advances in Semantic Processing
  • AMBIENT 2016, The Sixth International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2016, The Eighth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2016, The Fifth International Conference on Data Analytics
  • GLOBAL HEALTH 2016, The Fifth International Conference on Global Health Challenges
  • CYBER 2016, The First International Conference on Cyber-Technologies and Cyber-Systems

InfoWare 2016
November 13 - 17, 2016 - Barcelona, Spain

  • ICCGI 2016, The Eleventh International Multi-Conference on Computing in the Global Information Technology
  • ICWMC 2016, The Twelfth International Conference on Wireless and Mobile Communications
  • QoSE WMC 2016, The First International Workshop on QoS and Energy-aware Algorithms and Protocols in Wireless and Mobile Communications
  • VEHICULAR 2016, The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications
  • INTERNET 2016, The Eighth International Conference on Evolving Internet
  • COLLA 2016, The Sixth International Conference on Advanced Collaborative Networks, Systems and Applications
  • INTELLI 2016, The Fifth International Conference on Intelligent Systems and Applications
  • InManEnt 2016, The International Symposium on Intelligent Manufacturing Environments
  • VISUAL 2016, The First International Confernece on Applications and Systems of Visual Paradigms
  • HUSO 2016, The Second International Conference on Human and Social Analytics
  • BRAININFO 2016, The First International Conference on Neuroscience and Cognitive Brain Information

 


ThinkMind // CLOUD COMPUTING 2010, The First International Conference on Cloud Computing, GRIDs, and Virtualization // View article cloud_computing_2010_5_30_50067


Exploitation of Vulnerabilities in Cloud Storage

Authors:
Narendran Calluru Rajasekar
Chris Imafidon

Keywords: cloud storage; security; architecture; vulnerabilities

Abstract:
The paper presents the vulnerabilities of cloud storage and various possible attacks exploiting these vulnerabilities that relate to cloud security, which is one of the challenging features of cloud computing. The attacks are classified into three broad categories of which the social networking based attacks are the recent attacks which are evolving out of existing technologies such as P2P file sharing. The study is extended to available defence mechanisms and current research areas of cloud storage. Based on the study, simple cloud storage is implemented and the major aspects such as login mechanism, encryption techniques and key management techniques are evaluated against the presented attacks. The study proves that the cloud storage consumers are still dependent on the trust and contracts agreed with the service provider and there is no hard way of proven defense mechanisms against the attacks.

Pages: 122 to 127

Copyright: Copyright (c) IARIA, 2010

Publication date: November 21, 2010

Published in: conference

ISSN: 2308-4294

ISBN: 978-1-61208-106-9

Location: Lisbon, Portugal

Dates: from November 21, 2010 to November 26, 2010

SERVICES CONTACT
2010 - 2015 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.