Security Review for Cloud Vulnerability: Insecure API Implementation
Keywords:
AWS, IaaS, PaaS, SaaS, Linux,Client-Server ArchitectureAbstract
The core encounter of any network computing technique is susceptibility. With the cloud computing environment the services are the key
utilization from the concept of virtualization. Cloud networks are typically having threats like account hijacking/session riding, data breach,
malicious insiders, and insecure API and system vulnerabilities. These
practices may be reduced by using secure architectures and stable
services. Creating security groups, multi-factor authentication for privilege management, and data protection by shaping and classifying the
type, infrastructure control and detective control. But a large problem
with API keys is the inclusion of third-party applications or services for
health checkups, automating the system for scalability copying snapshots of database where these API keys may be exposed without our
knowledge by adding another attacking space. So, vulnerability must
always be described in terms of resistance to a certain type of attack.
References
Zhu G, Yin Y, Cai R et al. Detecting Virtualization Specific
Vulnerabilities In Cloud Computing Environment.
IEEE 10th International Conference On CloudComputing: 743-748.
Efozia NF, Ariwa E, Asogwa DC et al. A Review Of Threats
And Vulnerabilities To Cloud Computing Existence.
The Seventh International Conference Of Innovative
Computing Technology( INTECH 2017): 197-204
Teng Y, Wang X. Research On The Application Of
Openstack To Build A New Hetrogeneous Real-Time
Virtual Cloud To Reproduce Application Vulnerability
And Training Demonstration Architecture, 978-1-5090-
-4/17/$31.00 , 2017 IEEE pp. 1304-1308
Sill A. The Design And Architecture Of Microservices”
Ieee Cloud Computing Published By The IEEE Computer
Society Issn 2325-6095/2016 Pp.76-80
Grobauer B. Tobias Walloschek, And ElmarStöcker
“Understanding Cloud Computing Vulnerabilities”
Copublished By The IEEE Computer And Reliability
Societies, ISSN 1540-7993/2011: 50-57
Jon-Michael C. Brook, Field S, Shackleford D.
The Treacherous 12 - Top Threats To Cloud
Computing+Industry Insights. 2017 Cloud Security
Alliance.
Goyal V, Kant C. An Effective Hybrid Encryption
Algorithm for Ensuring Cloud Data Security” Part of
the Advances in Intelligent Systems and Computing
book series (AISC, volume 654)Big Data Analytics pp
-210.