Security Review for Cloud Vulnerability: Insecure API Implementation

Authors

  • Mr. Kapil Sharma "Department of Computer Science and Engineering Swami Keshvanand Institute of Technology, Management & Gramothan, Jaipur"

Keywords:

AWS, IaaS, PaaS, SaaS, Linux,Client-Server Architecture

Abstract

The core encounter of any network computing technique is susceptibility. With the cloud computing environment the services are the key
utilization from the concept of virtualization. Cloud networks are typically having threats like account hijacking/session riding, data breach,
malicious insiders, and insecure API and system vulnerabilities. These
practices may be reduced by using secure architectures and stable
services. Creating security groups, multi-factor authentication for privilege management, and data protection by shaping and classifying the
type, infrastructure control and detective control. But a large problem
with API keys is the inclusion of third-party applications or services for
health checkups, automating the system for scalability copying snapshots of database where these API keys may be exposed without our
knowledge by adding another attacking space. So, vulnerability must
always be described in terms of resistance to a certain type of attack.

References

Zhu G, Yin Y, Cai R et al. Detecting Virtualization Specific

Vulnerabilities In Cloud Computing Environment.

IEEE 10th International Conference On CloudComputing: 743-748.

Efozia NF, Ariwa E, Asogwa DC et al. A Review Of Threats

And Vulnerabilities To Cloud Computing Existence.

The Seventh International Conference Of Innovative

Computing Technology( INTECH 2017): 197-204

Teng Y, Wang X. Research On The Application Of

Openstack To Build A New Hetrogeneous Real-Time

Virtual Cloud To Reproduce Application Vulnerability

And Training Demonstration Architecture, 978-1-5090-

-4/17/$31.00 , 2017 IEEE pp. 1304-1308

Sill A. The Design And Architecture Of Microservices”

Ieee Cloud Computing Published By The IEEE Computer

Society Issn 2325-6095/2016 Pp.76-80

Grobauer B. Tobias Walloschek, And ElmarStöcker

“Understanding Cloud Computing Vulnerabilities”

Copublished By The IEEE Computer And Reliability

Societies, ISSN 1540-7993/2011: 50-57

Jon-Michael C. Brook, Field S, Shackleford D.

The Treacherous 12 - Top Threats To Cloud

Computing+Industry Insights. 2017 Cloud Security

Alliance.

Goyal V, Kant C. An Effective Hybrid Encryption

Algorithm for Ensuring Cloud Data Security” Part of

the Advances in Intelligent Systems and Computing

book series (AISC, volume 654)Big Data Analytics pp

-210.

Published

2020-06-04