Cyberattacks and Security of Cloud Computing: A Complete Guideline
Abstract
:1. Introduction
2. Threat Reasons in Cloud Computing
2.1. Cloud Computing Fundamentals
2.2. Cloud Security: Safeguarding Data and Resources
2.3. Recent Studies in Cloud Security
3. Service Models of Cloud Computing
3.1. Infrastructure as a Service (IaaS)
- Securing virtual machine instances and hypervisors.
- Protecting against unauthorized access to IaaS resources.
- Ensuring data security and isolation in a multitenant environment.
3.2. Platform as a Service (PaaS)
- Ensuring secure application development and deployment.
- Protecting sensitive data processed by platform services.
- Guarding against vulnerabilities in custom-developed applications.
3.3. Software as a Service (SaaS)
3.3.1. Security Challenges
- Ensuring data privacy and compliance in shared SaaS environments.
- Protecting against account hijacking and unauthorized access.
- Managing the security of data handled by the SaaS provider.
3.3.2. Cloud Deployment Models
3.3.3. Private Cloud
3.3.4. Security Challenges
- Ensuring data privacy and compliance with internal policies and regulations.
- Protecting against insider threats, as access is limited to organizational members.
- Maintaining robust access controls to prevent unauthorized entry.
3.3.5. Public Cloud
3.3.6. Security Challenges
- Protecting data in a shared environment with multiple users.
- Ensuring data sovereignty and compliance with regional regulations.
- Guarding against external threats, such as DDoS attacks.
3.3.7. Community Cloud
3.3.8. Security Challenges
- Balancing the unique security requirements of multiple community members.
- Establishing trust among community members.
- Ensuring data separation and access control.
3.3.9. Hybrid Cloud
3.3.10. Security Challenges
- Ensuring seamless data and application portability between diverse cloud environments
- Coordinating security measures across different clouds.
- Managing the complexity of multiple security domains.
3.4. Virtualization Issues
3.5. Hypervisor
3.6. Migration and Pivoting
3.7. Scalability and Availability
3.7.1. Data Integrity
3.7.2. Cloud Broker
4. Security Problems
4.1. Data Breaches
4.2. Data Confidentiality
4.3. Data Access Controllability
4.4. Authentication
4.5. Inadequate Diligence
4.6. Phishing
4.7. Key Exposure
4.8. Auditing
4.8.1. Quality Assessment and Trust Building
4.8.2. Identify Organizational Weaknesses
4.8.3. Audit Report
- Provide a quality evaluation to audit customers and their willingness to trust the assurances of the network operator on internal processes.
- Evaluate the effectiveness of internal monitoring and compliance of the cloud infrastructure service provider for stakeholders.
- Describe organizational management weaknesses in the organization of the client and the interface to services.
- The audit report shall be drawn up by the auditors, in which all the identified items must be registered. Three sections need to be completed, including the purpose, the audit protocol, and the related common findings. The objective portion of the applicable specification carries out the independent audit standard requirements to be audited for conformity with cloud computing.
4.9. Privacy Preservability
4.10. Security Threats to Hosted Virtual Machines
- Software vulnerabilities: Hosted VMs can be vulnerable to software exploits, including application vulnerabilities, operating system vulnerabilities, and unpatched software. Attackers may target these vulnerabilities to gain unauthorized access or disrupt VM functionality.
- Data breaches: Data stored within VMs are at risk of being breached if proper security measures are not in place. Unauthorized access to VMs can lead to the theft or exposure of sensitive data, compromising confidentiality and compliance requirements.
- Unauthorized access: Attackers may attempt to gain unauthorized access to VM instances. Once inside, they can potentially compromise the integrity of the VM, disrupt its operations, or use it as a launching point for further attacks within the network.
5. Attacks in Cloud Computing
5.1. Denial of Service (DoS) Attacks
5.2. Jamming Attack
5.3. Sybil Attack
5.4. Black Hole Attack
5.5. Wormhole Attack
5.6. Accountability
6. Possible Solutions
6.1. Data Transmission
6.2. Two-Factor Authentication
6.3. Honeypot
6.4. Changing Cloud Servers
6.5. Self-Adaptive Approach
6.6. Ring Signatures
6.7. Runtime Auditing
6.8. Revocation Keys
6.9. Security Model as a Service
7. Countermeasures for Threats in Cloud Computing
7.1. Protecting against Data Breaches and System Vulnerability
7.1.1. Multifactor Authentication (MFA)
7.1.2. Encryption
7.1.3. Routine Vulnerability Scanning
7.2. Secure Interfaces and APIs
7.2.1. Source Code Review
7.2.2. Entrance Testing
7.3. Credential and Access Management
Enhanced Security against Password Theft
7.4. Account Hijacking and Denial of Service (DoS)
7.4.1. Prohibition of Credential Sharing
7.4.2. Two-Factor Authentication (2FA)
7.4.3. Bandwidth Expansion
7.4.4. Intrusion Prevention Systems (IPS) and Firewalls
7.5. Identity and Access Management (IAM)
7.5.1. Identity Management
7.5.2. Authentication
7.5.3. Authorization
7.6. Digital Signatures and Message Digests
7.6.1. Message Digests
7.6.2. Digital Signatures
7.7. Intrusion Detection Systems (IDS)
7.7.1. Network-Based IDS
7.7.2. Host-Based IDS
7.7.3. Hypervisor-Based IDS
7.8. Security Measures for Data Storage
7.8.1. Data Classification
7.8.2. Data Encryption
7.8.3. Data Sanitization
7.9. Network Security Measures
7.9.1. Firewalls
7.9.2. Intrusion Detection and Prevention Systems (IDS/IPS)
7.9.3. Penetration Testing
8. Future Directions
8.1. Safeguarding Cloud Infrastructure
8.2. Ensuring Data Privacy and Security
8.3. Multitenancy Efficiency
8.4. Fog Computing for Improved IoT Security
8.5. Homomorphic Encryption
8.6. Leveraging Machine Learning Techniques
8.7. Deduplication in Cloud-to-Cloud Backups
8.8. Insider Threat Detection
9. Implications of Cloud Deployment Models on Security
9.1. Private Clouds
9.1.1. Operational Security
9.1.2. Customized Security
9.1.3. Management Complexity
9.1.4. Resource Constraints
9.1.5. Cost vs. Security
9.1.6. Risk Assessment
9.1.7. Flexibility in Compliance
9.2. Public Clouds
9.2.1. Shared Resources
9.2.2. Compliance Challenges
9.3. Security Measures
9.3.1. Access Control
9.3.2. Data Encryption
9.3.3. Vendor Security
9.3.4. Regular Auditing
9.4. Hybrid Clouds
9.4.1. Data Segmentation
9.4.2. Interoperability Challenges
9.4.3. Data Transfer Security
9.4.4. Identity and Access Management (IAM)
9.4.5. Logging and Monitoring
9.4.6. Compliance Complexity
9.4.7. Resource Management
9.4.8. End-to-End Encryption
9.4.9. Monitoring for Malicious Activity
9.4.10. Securing Shared Resources
10. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Tu, S.; Waqas, M.; Rehman, S.U.; Aamir, M.; Chang, C.C. Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack. IEEE Access 2018, 6, 74993–75001. [Google Scholar] [CrossRef]
- Qiu, H.; Noura, H.; Qiu, M.; Ming, Z.; Memmi, G. A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans. Cloud Comput. 2019, 9, 1293–1304. [Google Scholar] [CrossRef]
- Li, Z.; Yang, Z.; Xie, S. Computing resource trading for edge-cloud-assisted Internet of Things. IEEE Trans. Ind. Inform. 2019, 15, 3661–3669. [Google Scholar] [CrossRef]
- Fan, X.; Yao, J.; Cao, N. Research on Cloud Computing Security Problems and Protection Countermeasures. In Proceedings of the International Symposium on Cyberspace Safety and Security, Guangzhou, China, 1–3 December 2019; pp. 542–551. [Google Scholar]
- Kumar, R.; Goyal, R. On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Comput. Sci. Rev. 2019, 33, 1–48. [Google Scholar] [CrossRef]
- Huss, M.; Waqas, M.; Ding, A.Y.; Li, Y.; Ott, J. Security and Privacy in Device-to-Device (D2D) Communication: A Review. IEEE Commun. Surv. Tutor. 2017, 19, 1054–1079. [Google Scholar] [CrossRef]
- Fazal, H.; Memon, I.; Khatri, T.K.; Muhammad, G.; Ali, Q. A survey on cloud computing, security Challenges, architecture, applications & solutions. Univ. Sindh J. Inf. Commun. Technol. 2020, 4, 24–30. [Google Scholar]
- Tu, S.; Waqas, M.; Rehman, S.U.; Mir, T.; Abbas, G.; Abbas, Z.H.; Halim, Z.; Ahmad, I. Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. IEEE Trans. Veh. Technol. 2021, 70, 1474–1479. [Google Scholar] [CrossRef]
- Kumar, R.; Goyal, R. Assurance of Data Security and Privacy in the Cloud: A Three-Dimensional Perspective. Softw. Qual. Prof. 2019, 21, 7–26. [Google Scholar]
- Tu, S.; Waqas, M.; Meng, Y.; Rehman, S.U.; Ahmad, I.; Koubaa, A.; Halim, Z.; Hanif, M.; Chang, C.C.; Shi, C. Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL. Comput. Commun. 2020, 160, 790–798. [Google Scholar] [CrossRef]
- Shen, J.; Gui, Z.; Ji, S.; Shen, J.; Tan, H.; Tang, Y. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 2018, 106, 117–123. [Google Scholar] [CrossRef]
- Ahmed, M.; Li, Y.; Waqas, M.; Sheraz, M.; Jin, D.; Han, Z. A Survey on Socially Aware Device-to-Device Communications. IEEE Commun. Surv. Tutor. 2018, 20, 2169–2197. [Google Scholar] [CrossRef]
- Mani, A.C.; Malviya, A.K. Security Challenges in Cloud Computing Networks. In Proceedings of the 2nd International Conference on Advanced Computing and Software Engineering (ICACSE), Sultanpur, India, 8–9 February 2019. [Google Scholar]
- Waqas, M.; Niu, Y.; Li, Y.; Ahmed, M.; Jin, D.; Chen, S.; Han, Z. A Comprehensive Survey on Mobility-Aware D2D Communications: Principles, Practice and Challenges. IEEE Commun. Surv. Tutor. 2020, 22, 1863–1886. [Google Scholar] [CrossRef]
- Kushala, M.V.; Shylaja, B.S. Recent Trends on Security Issues in Multi-Cloud Computing: A Survey. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 10–12 September 2020; pp. 777–781. [Google Scholar]
- Mondal, A.; Paul, S.; Goswami, R.T.; Nath, S. Cloud computing security issues & challenges: A Review. In Proceedings of the 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 22–24 January 2020; pp. 1–5. [Google Scholar]
- Subashini, S.; Kavitha, V. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 2011, 34, 1–11. [Google Scholar] [CrossRef]
- Grusho, A.A.; Zabezhailo, M.I.; Zatsarinnyi, A.A.; Piskovskii, V.O. On some artificial intelligence methods and technologies for cloud-computing protection. Autom. Doc. Math. Linguist. 2017, 51, 62–74. [Google Scholar] [CrossRef]
- Liu, Y.; Sun, Y.L.; Ryoo, J.; Vasilakos, A.V. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions; Korean Institute of Information Scientists and Engineers (KIISE): Seoul, Republic of Korea, 2015. [Google Scholar]
- Syed, A.; Purushotham, K.; Shidaganti, G. Cloud storage security risks, practices and measures: A review. In Proceedings of the 2020 IEEE International Conference for Innovation in Technology (INOCON), Bangluru, India, 6–8 November 2020; pp. 1–4. [Google Scholar]
- Kumari, C.; Singh, G.; Singh, G.; Batth, R.S. Security issues and challenges in cloud computing: A mirror review. In Proceedings of the 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates, 11–12 December 2019; pp. 701–706. [Google Scholar]
- Ghaffari, F.; Gharaee, H.; Arabsorkhi, A. Cloud security issues based on people, process and technology model: A survey. In Proceedings of the 2019 5th International Conference on web research (ICWR), Tehran, Iran, 24–25 April 2019; pp. 196–202. [Google Scholar]
- Mandal, S.; Khan, D.A. A Study of security threats in cloud: Passive impact of COVID-19 pandemic. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 10–12 September 2020; pp. 837–842. [Google Scholar]
- Bhajantri, L.B.; Mujawar, T. A survey of cloud computing security challenges, issues and their countermeasures. In Proceedings of the 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India, 12–14 December 2019; pp. 376–380. [Google Scholar]
- Nafea, R.A.; Almaiah, M.A. Cyber security threats in cloud: Literature review. In Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 779–786. [Google Scholar]
- Butt, U.A.; Amin, R.; Mehmood, M.; Aldabbas, H.; Alharbi, M.T.; Albaqami, N. Cloud security threats and solutions: A survey. Wirel. Pers. Commun. 2023, 128, 387–413. [Google Scholar] [CrossRef]
- Shamshirband, S.; Fathi, M.; Chronopoulos, A.T.; Montieri, A.; Palumbo, F.; Pescapè, A. Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. J. Inf. Secur. Appl. 2020, 55, 102582. [Google Scholar] [CrossRef]
- Alotaibi, A.F. A comprehensive survey on security threats and countermeasures of cloud computing environment. Turk. J. Comput. Math. Educ. (TURCOMAT) 2021, 12, 1978–1990. [Google Scholar]
- Basu, S.; Bardhan, A.; Gupta, K.; Saha, P.; Pal, M.; Bose, M.; Basu, K.; Chaudhury, S.; Sarkar, P. Cloud computing security challenges & solutions—A survey. In Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 347–356. [Google Scholar]
- Nagesh, O.; Kumar, T.; Venkateswararao, V. A Survey on Security Aspects of Server Virtualization in Cloud Computing. Int. J. Electr. Comput. Eng. 2017, 7, 1326–1336. [Google Scholar] [CrossRef]
- RahimiZadeh, K.; AnaLoui, M.; Kabiri, P.; Javadi, B. Performance modeling and analysis of virtualized multi-tier applications under dynamic workloads. J. Netw. Comput. Appl. 2015, 56, 166–187. [Google Scholar] [CrossRef]
- Abazari, F.; Analoui, M.; Takabi, H. Effect of anti-malware software on infectious nodes in cloud environment. Comput. Secur. 2016, 58, 139–148. [Google Scholar] [CrossRef]
- Sharifi, M.; Salimi, H.; Asadi, E. Alamut: A high-performance network intrusion detection system in support of virtualized environments. Secur. Commun. Netw. 2013, 6, 1310–1318. [Google Scholar] [CrossRef]
- Atzori, L.; Bellido, J.L.; Bolla, R.; Genovese, G.; Iera, A.; Jara, A.; Lombardo, C.; Morabito, G. SDN & NFV contribution to IoT objects virtualization. Comput. Netw. 2019, 149, 200–212. [Google Scholar]
- Goyal, K.; Jain, V.; Verma, P. An analysis on virtual machine migration issues and challenges in cloud computing. Int. J. Comput. Appl. 2018, 975, 8887. [Google Scholar]
- Ahmed, M.; Litchfield, A.T. Taxonomy for identification of security issues in cloud computing environments. J. Comput. Inf. Syst. 2018, 58, 79–88. [Google Scholar] [CrossRef]
- Patil, R.; Dudeja, H.; Modi, C. Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 2019, 85, 402–422. [Google Scholar] [CrossRef]
- Jabeen, T.; Ashraf, H.; Khatoon, A.; Band, S.S.; Mosavi, A. A lightweight genetic based algorithm for data security in wireless body area networks. IEEE Access 2020, 8, 183460–183469. [Google Scholar] [CrossRef]
- AlKadi, O.; Moustafa, N.; Turnbull, B.; Choo, K.K.R. Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 2019, 7, 114607–114618. [Google Scholar] [CrossRef]
- Haider, S.; Abbas, Z.H.; Abbas, G.; Waqas, M.; Tu, S.; Zhao, W. A Novel Cross-Layer V2V Architecture for Direction-Aware Cooperative Collision Avoidance. Electronics 2020, 9, 1112. [Google Scholar] [CrossRef]
- Moghaddam, M.J.; Esmaeilzadeh, A.; Ghavipour, M.; Zadeh, A.K. Minimizing virtual machine migration probability in cloud computing environments. Clust. Comput. 2020, 23, 3029–3038. [Google Scholar] [CrossRef]
- Tu, S.; Liu, M.; Waqas, M.; ur Rehman, S.; Zhu, R.; Liu, L. FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network. IEEE Access 2018, 6, 46976–46987. [Google Scholar] [CrossRef]
- Joshi, N.; Shah, S. A comprehensive survey of services provided by prevalent cloud computing environments. In Smart Intelligent Computing and Applications; Springer: Singapore, 2019; pp. 413–424. [Google Scholar]
- Tchernykh, A.; Schwiegelsohn, U.; Talbi, E.-g.; Babenko, M. Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. J. Comput. Sci. 2019, 36, 100581. [Google Scholar] [CrossRef]
- Ahmad, A.A.S.; Andras, P. Measuring the scalability of cloud-based software services. In Proceedings of the 2018 IEEE World Congress on Services (SERVICES), San Francisco, CA, USA, 2–7 July 2018; pp. 5–6. [Google Scholar]
- Ullah, S.; Abbas, G.; Abbas, Z.H.; Waqas, M.; Ahmed, M. RBO-EM: Reduced Broadcast Overhead Scheme for Emergency Message Dissemination in VANETs. IEEE Access 2020, 8, 175205–175219. [Google Scholar] [CrossRef]
- Waqas, M.; Tu, S.; Rehman, S.U.; Halim, Z.; Anwar, S.; Abbas, G.; Abbas, Z.H.; Rehman, O.U. Authentication of Vehicles and Road Side Units in Intelligent Transportation System. CMC-Comput. Mater. Contin. 2020, 64, 359–371. [Google Scholar] [CrossRef]
- Tseng, C.L.; Lin, F.J. Extending scalability of IoT/M2M platforms with fog computing. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; pp. 825–830. [Google Scholar]
- Zeng, M.; Li, Y.; Zhang, K.; Waqas, M.; Jin, D. Incentive Mechanism Design for Computation Offloading in Heterogeneous Fog Computing: A Contract-Based Approach. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
- Yang, H.; Kim, Y. Design and implementation of high-availability architecture for IoT-cloud services. Sensors 2019, 19, 3276. [Google Scholar] [CrossRef] [PubMed]
- Torquato, M.; Umesh, I.; Maciel, P. Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration. J. Supercomput. 2018, 74, 4817–4841. [Google Scholar] [CrossRef]
- Zafar, F.; Khan, A.; Malik, S.U.R.; Ahmed, M.; Anjum, A.; Khan, M.I.; Javed, N.; Alam, M.; Jamil, F. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput. Secur. 2017, 65, 29–49. [Google Scholar] [CrossRef]
- Yan, Y.X.; Wu, L.; Xu, W.Y.; Wang, H.; Liu, Z.M. Integrity audit of shared cloud data with identity tracking. Secur. Commun. Netw. 2019, 2019, 1354346. [Google Scholar] [CrossRef]
- Li, J.; Yan, H.; Zhang, Y. Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 2020, 15, 577–585. [Google Scholar] [CrossRef]
- Badshah, A.; Jalal, A.; Farooq, U.; Rehman, G.U.; Band, S.S.; Iwendi, C. Service Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds. Big Data 2022, 11, 339–354. [Google Scholar] [CrossRef]
- Huttunen, J.; Jauhiainen, J.; Lehti, L.; Nylund, A.; Martikainen, M.; Lehner, O. Big data, cloud computing and data science applications in finance and accounting. ACRN J. Financ. Risk Perspect. 2019, 8, 16–30. [Google Scholar]
- Truong, H.L. Integrated analytics for IIoT predictive maintenance using IoT big data cloud systems. In Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII), Seattle, WA, USA, 21–23 October 2018; pp. 109–118. [Google Scholar]
- Waqas, M.; Niu, Y.; Ahmed, M.; Li, Y.; Jin, D.; Han, Z. Mobility-Aware Fog Computing in Dynamic Environments: Understandings and Implementation. IEEE Access 2019, 7, 38867–38879. [Google Scholar] [CrossRef]
- Stergiou, C.; Psannis, K.E.; Gupta, B.B.; Ishibashi, Y. Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain. Comput. Inform. Syst. 2018, 19, 174–184. [Google Scholar]
- Zhang, Y.; Yang, M.; Zheng, D.; Lang, P.; Wu, A.; Chen, C. Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput. 2018, 22, 7763–7772. [Google Scholar] [CrossRef]
- Mei, J.; Li, K.; Tong, Z.; Li, Q.; Li, K. Profit maximization for cloud brokers in cloud computing. IEEE Trans. Parallel Distrib. Syst. 2018, 30, 190–203. [Google Scholar] [CrossRef]
- Nagarajan, R.; Thirunavukarasu, R.; Shanmugam, S. A cloud broker framework for infrastructure service discovery using semantic network. Int. J. Intell. Eng. Syst. 2018, 11, 11–19. [Google Scholar] [CrossRef]
- Halabi, T.; Bellaiche, M. A broker-based framework for standardization and management of Cloud Security-SLAs. Comput. Secur. 2018, 75, 59–71. [Google Scholar] [CrossRef]
- Kanagaraju, P.; Nallusamy, R. Registry service selection based secured Internet of Things with imperative control for industrial applications. Clust. Comput. 2019, 22, 12507–12519. [Google Scholar] [CrossRef]
- Ramachandra, G.; Iftikhar, M.; Khan, F.A. A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 2017, 110, 465–472. [Google Scholar] [CrossRef]
- Ahmed, M.; Shi, H.; Chen, X.; Li, Y.; Waqas, M.; Jin, D. Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme. IEEE Trans. Wirel. Commun. 2018, 17, 4118–4133. [Google Scholar] [CrossRef]
- Majumdar, S.; Jarraya, Y.; Madi, T.; Alimohammadifar, A.; Pourzandi, M.; Wang, L.; Debbabi, M. Proactive verification of security compliance for clouds through pre-computation: Application to OpenStack. In Proceedings of the European Symposium on Research in Computer Security, Heraklion, Greece, 26–30 September 2016; pp. 47–66. [Google Scholar]
- Tu, S.; Waqas, M.; Rehman, S.U.; Mir, T.; Halim, Z.; Ahmad, I. Social phenomena and fog computing networks: A novel perspective for future networks. IEEE Trans. Comput. Soc. Syst. 2021, 9, 32–44. [Google Scholar] [CrossRef]
- Kalaiprasath, R.; Elankavi, R.; Udayakumar, D.R. Cloud security and compliance—A semantic approach in end to end security. Int. J. Mech. Eng. Technol. 2017, 8, 987–994. [Google Scholar] [CrossRef]
- Tanveer, M.; Abbas, G.; Abbas, Z.H.; Waqas, M.; Muhammad, F.; Kim, S. S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme. Sensors 2020, 20, 2707. [Google Scholar] [CrossRef] [PubMed]
- Singh, C.; Singh, D. A 3-Level Multifactor Authentication Scheme for Cloud Computing. Int. J. Comput. Eng. Technol. 2019, 10, 184–195. [Google Scholar] [CrossRef]
- Casola, V.; Benedictis, A.D.; Rak, M.; Villano, U.; Rios, E.; Rego, A.; Capone, G. Model-based deployment of secure multi-cloud applications. Int. J. Grid Util. Comput. 2019, 10, 639–653. [Google Scholar] [CrossRef]
- Bhushan, K.; Gupta, B.B. Distributed Denial of Service (DDoS) attack mitigation in software-defined network (SDN) - based cloud computing environment. J. Ambient Intell. Humaniz. Comput. 2019, 10, 1985–1997. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, H.; Xu, C. Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf. Sci. 2019, 472, 223–234. [Google Scholar] [CrossRef]
- Wan, J.; Waqas, M.; Tu, S.; Hussain, S.M.; Shah, A.; Rehman, S.U.; Hanif, M. An efficient impersonation attack detection method in fog computing. CMC Comput. Mater. Contin. 2021, 68, 267–281. [Google Scholar] [CrossRef]
- Waqas, M.; Ahmed, M.; Yong, L.; Jin, D.; Chen, S. Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays. IEEE Trans. Wirel. Commun. 2018, 17, 3918–3930. [Google Scholar] [CrossRef]
- Waqas, M.; Ahmed, M.; Zhang, J.; Li, Y. Confidential Information Ensurance through Physical Layer Security in Device-to-Device Communication. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar]
- Archana, B.; Chandrashekar, A.; Bangi, A.G.; Sanjana, B.; Akram, S. Survey on usable and secure two-factor authentication. In Proceedings of the 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 19–20 May 2017; pp. 842–846. [Google Scholar]
- Waqas, M.; Tu, S.; Halim, Z.; Rehman, S.U.; Abbas, G.; Abbas, Z.H. The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges. Artif. Intell. Rev. 2022, 55, 5215–5261. [Google Scholar] [CrossRef]
- Nadeem, M.; Arshad, A.; Riaz, S.; Band, S.S.; Mosavi, A. Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access 2021, 9, 152300–152309. [Google Scholar] [CrossRef]
- Safdar Malik, T.; Siddiqui, M.N.; Mateen, M.; Malik, K.R.; Sun, S.; Wen, J. Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring. Secur. Commun. Netw. 2022, 2022, 4943218. [Google Scholar] [CrossRef]
- Dwivedi, R.K.; Saran, M.; Kumar, R. A survey on security over sensor-cloud. In Proceedings of the 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 10–11 January 2019; pp. 31–37. [Google Scholar]
- Halim, Z.; Sulaiman, M.; Waqas, M.; Aydın, D. Deep neural network-based identification of driving risk utilizing driver dependent vehicle driving features: A scheme for critical infrastructure protection. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 11747–11765. [Google Scholar] [CrossRef]
- Tu, S.; Huang, X.; Huang, Y.; Waqas, M.; Rehman, S.U. SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network. IEEE Access 2018, 6, 66153–66164. [Google Scholar] [CrossRef]
- Namasudra, S.; Devi, D.; Kadry, S.; Sundarasekar, R.; Shanthini, A. Towards DNA based data security in the cloud computing environment. Comput. Commun. 2020, 151, 539–547. [Google Scholar] [CrossRef]
- Kaur, R.; Chana, I.; Bhattacharya, J. Data deduplication techniques for efficient cloud storage management: A systematic review. J. Supercomput. 2018, 74, 2035–2085. [Google Scholar] [CrossRef]
- Namasudra, S. An improved Attribute-based Encryption technique towards the data security in cloud computing. Concurr. Comput. Pract. Exp. 2019, 31, 4364. [Google Scholar] [CrossRef]
- Kumar, S.; Jafri, S.A.A.; Nigam, N.; Gupta, N.; Gupta, G.; Singh, S.K. A New User Identity Based Authentication, Using Security and Distributed for Cloud Computing. IOP Conf. Ser. Mater. Sci. Eng. 2020, 748, 012026. [Google Scholar] [CrossRef]
- Derhab, A.; Belaoued, M.; Guerroumi, M.; Khan, F.A. Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing. IEEE Access 2020, 8, 28956–28969. [Google Scholar] [CrossRef]
- Esiner, E.; Datta, A. Two-factor authentication for trusted third party free dispersed storage. Future Gener. Comput. Syst. 2019, 90, 291–306. [Google Scholar] [CrossRef]
- Vassilev, V.; Phipps, A.; Lane, M.; Mohamed, K.; Naciscionis, A. Two-factor authentication for voice assistance in digital banking using public cloud services. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science Engineering (Confluence), Noida, India, 29–31 January 2020; pp. 404–409. [Google Scholar]
- Saxena, M.A.; Ubnare, G.; Dubey, A. Virtual Public Cloud Model in Honeypot for Data Security: A New Technique. In Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, Bali, Indonesia, 19–22 April 2019; pp. 66–71. [Google Scholar]
- Negi, P.S.; Garg, A.; Lal, R. Intrusion detection and prevention using honeypot network for cloud security. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 January 2020; pp. 129–132. [Google Scholar]
- Wang, J.; Chen, X. Efficient and secure storage for outsourced data: A survey. Data Sci. Eng. 2016, 1, 178–188. [Google Scholar] [CrossRef]
- Pape, S.; Stankovic, J. An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security. In Computer Security; Springer: Cham, Switzerland, 2019; pp. 287–306. [Google Scholar]
- Mani, G.; Ulybyshev, D.A.; Bhargava, B.K.; Kobes, J.; Goyal, P. Autonomous Aggregate Data Analytics in Untrusted Cloud. In Proceedings of the 2018 IEEE First International Conference on Artificial Intelligence and Knowledge Engineering AIKE, Laguna Hills, CA, USA, 26–28 September 2018; pp. 138–141. [Google Scholar]
- Norman, S.; Chase, J.; Goodwin, D.; Freeman, B.; Boyle, V.; Eckman, R. A condensed approach to the cyber resilient design space. Insight 2016, 19, 43–46. [Google Scholar] [CrossRef]
- Yu, J.; Ren, K.; Wang, C. Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1362–1375. [Google Scholar] [CrossRef]
- Shen, W.; Yu, J.; Xia, H.; Zhang, H.; Lu, X.; Hao, R. Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 2017, 82, 56–64. [Google Scholar] [CrossRef]
- Vijayakumar, K.; Suchitra, S.; Shri, P.S. A secured cloud storage auditing with empirical outsourcing of key updates. Int. J. Reason.-Based Intell. Syst. 2019, 11, 109–114. [Google Scholar] [CrossRef]
- Shin, Y.; Koo, D.; Yun, J.; Hur, J. Decentralized server-aided encryption for secure deduplication in cloud storage. IEEE Trans. Serv. Comput. 2017, 13, 1021–1033. [Google Scholar] [CrossRef]
- Rabaninejad, R.; Sedaghat, S.M.; Attari, M.A.; Aref, M.R. An ID-Based Privacy-Preserving Integrity Verification of Shared Data Over Untrusted Cloud. In Proceedings of the 2020 25th International Computer Conference, Computer Society of Iran (CSICC), Tehran, Iran, 1–2 January 2020; pp. 1–6. [Google Scholar]
- Thokchom, S.; Saikia, D.K. Privacy preserving integrity checking of shared dynamic cloud data with user revocation. J. Inf. Secur. Appl. 2020, 50, 102427. [Google Scholar] [CrossRef]
- Wang, B.; Li, B.; Li, H. Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In Proceedings of the International Conference on Applied Cryptography and Network Security, Singapore, 26–29 June 2012; pp. 507–525. [Google Scholar]
- Tang, H.; Cui, Y.; Guan, C.; Wu, J.; Weng, J.; Ren, K. Enabling ciphertext deduplication for secure cloud storage and access control. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, China, 30 May–3 June 2016; pp. 59–70. [Google Scholar]
- Majumdar, S.; Madi, T.; Wang, Y.; Jarraya, Y.; Pourzandi, M.; Wang, L.; Debbabi, M. User-level runtime security auditing for the cloud. IEEE Trans. Inf. Forensics Secur. 2017, 13, 1185–1199. [Google Scholar] [CrossRef]
- Mercl, L.; Sobeslav, V.; Mikulecky, P.; Macinka, M. Infrastructure Authentication, Authorization and Accounting Solutions for an OpenStack Platform. In Proceedings of the International Conference on Mobile Web and Intelligent Information Systems, Istanbul, Turkey, 26–28 August 2019; pp. 123–135. [Google Scholar]
- Wang, S.; Wang, H.; Li, J.; Wang, H.; Chaudhry, J.; Alazab, M.; Song, H. A Fast CP-ABE System for Cyber-Physical Security and Privacy in Mobile Healthcare Network. IEEE Trans. Ind. Appl. 2020, 56, 4467–4477. [Google Scholar] [CrossRef]
- Badri, H.; Bahreini, T.; Grosu, D.; Yang, K. Multi-stage stochastic programming for service placement in edge computing systems: Poster. In Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose, CA, USA, 12–14 October 2017; pp. 1–2. [Google Scholar]
- Marwan, M.; AlShahwan, F.; Sifou, F.; Kartit, A.; Ouahmane, H. Improving the Security of Cloud-based Medical Image Storage. Eng. Lett. 2019, 27, 175–193. [Google Scholar]
- Wang, B.; Li, B.; Li, H. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 2013, 8, 92–106. [Google Scholar] [CrossRef]
- Chi, P.W.; Lei, C.L. Audit-free cloud Storage via deniable Attribute-based Encryption. IEEE Trans. Cloud Comput. 2015, 6, 414–427. [Google Scholar] [CrossRef]
- Khalili, M.; Dakhilalian, M.; Susilo, W. Efficient chameleon hash functions in the enhanced collision resistant model. Inf. Sci. 2020, 510, 155–164. [Google Scholar] [CrossRef]
- Ramesh, S.; Govindarasu, M. An efficient framework for privacy-preserving computations on encrypted IoT data. IEEE Internet Things J. 2020, 7, 8700–8708. [Google Scholar] [CrossRef]
- Chi, P.W.; Wang, M.H. Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems. Sensors 2019, 19, 5463. [Google Scholar] [CrossRef] [PubMed]
- Varadharajan, V.; Tupakula, U. Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 2014, 11, 60–75. [Google Scholar] [CrossRef]
- Tu, S.; Yu, H.; Badshah, A.; Waqas, M.; Halim, Z.; Ahmad, I. Secure Internet of Vehicles (IoV) with Decentralized Consensus Blockchain Mechanism. IEEE Trans. Veh. Technol. 2023, 72, 11227–11236. [Google Scholar] [CrossRef]
- Glory, H.A.; Anusha, S.; Revathy, P.; Sandhya, G. Audit-Free Cloud Storage Via Randomized Key Protocol. Int. J. Contemp. Res. Comput. Sci. Technol. 2016, 2, 585–587. [Google Scholar]
- Tubaishat, A. Security in Cloud Computing: State-of-the-Art, Key Features, Challenges, and Opportunities. In Proceedings of the 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), Singapore, 23–25 February 2019; pp. 311–315. [Google Scholar]
- Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef]
- Alarifi, A.S. Information Privacy in the Cloud: Actual and Expectation. In Proceedings of the RSEP Conferences, Madrid, Spain, 10–12 September 2019; p. 51. [Google Scholar]
- Sgandurra, D.; Lupu, E. Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput. Surv. (CSUR) 2016, 48, 1–38. [Google Scholar] [CrossRef]
- Kumar, P.R.; Raj, P.H.; Jelciana, P. Exploring data security issues and solutions in cloud computing. Procedia Comput. Sci. 2018, 125, 691–697. [Google Scholar] [CrossRef]
- Subramanian, N.; Jeyaraj, A. Recent security challenges in cloud computing. Comput. Electr. Eng. 2018, 71, 28–42. [Google Scholar] [CrossRef]
- Tian, H.; Chen, Z.; Chang, C.C.; Huang, Y.; Wang, T.; Huang, Z.; Cai, Y.; Chen, Y. Public audit for operation behavior logs with error locating in cloud storage. Soft Comput. 2019, 23, 3779–3792. [Google Scholar] [CrossRef]
Category | Description |
---|---|
Auditing | Review and investigating cloud infrastructure |
Data confidentiality | Data that are not provided to unauthorized users |
Data access controllability | Restrict access to data outsourced to the cloud. |
Privacy preservability | Users hide their identity and protect their actions in data and information retrieved from the cloud |
Data accountability | Users ensure that others do not unknowingly misuse their data |
Network | Involves network attacks such as network availability Denial of Service (DOS) |
Access control | Privacy of user information and data storage |
Area | Threats | Problems | Affected Cloud Services | Solutions |
---|---|---|---|---|
Infrastructure Threats | Data breaches | Unauthorized access or retrieval of data, application, or service | IaaS, SaaS, and PaaS | Encryption of data, proofs of storage, server-aided secure computation |
Cloud service abuse | loss of validation service fraud and more vigorous attacks due to unidentified login | PaaS and IaaS | monitor network status and provide robust registration and authentication | |
Hijacking | Illegal control of certain authorized services by unauthorized users. Stolen user account credentials | IaaS, SaaS, and PaaS | Adopt a robust authentication mechanism, security policies, and a secure communication channel | |
Service threats | Service delivery | loss of control of cloud infrastructure | IaaS, SaaS and PaaS | Offer services that monitor and control cloud infrastructure |
Insecure interface | Improper authorization and incorrect authentication transmission of content | IaaS, SaaS, and PaaS | Transmission of data is encrypted, and there are authentication mechanisms | |
Platform threats | Malicious insiders | Infiltration of organizational resources, destruction of asset productivity losses, and impact on operations | IaaS, SaaS, and PaaS | Security and management processes that use protocol reports and breach notifications |
Identity theft | An attacker could gain the identity of a valid user to access the usage resources | IaaS, SaaS, and PaaS | Use strong multilayer passwords and authentication mechanisms |
Ref. | Category | Problems | Method | Achievements |
---|---|---|---|---|
[85] | Data transmission | Replacement of original data by fake data | DNA-based data security | 1024-bit secret key is generated based on DNA computing, user attributes, and MAC address |
[86] | Data transmission | Duplicate data in the cloud storage | Deduplication based on text and multimedia data | Improves storage utilization, eliminates unnecessary data and reduces storage costs |
[87] | Data transmission | Resource and knowledge sharing | Attribute-based encryption (ABE), a distributed hash table (DHT), and identity-based timed-release encryption (IDTRE) | Distributed into the DHT network, and encapsulated ciphertexts are stored on the cloud servers |
[88] | Two-factor authentication | Fetching, uploading, and manipulation of data | AES-based encryption and decryption | User login details are stored in one database, and encryption/decryption details are stored on a different database |
[89] | Two-factor authentication | Offloading mobile applications | Decision-making process to offload the authentication application and virtual smart card | Security, mobile device’s residual energy, and energy cost |
[90] | Two-factor authentication | Data storage and multiuser collaboration over an infrastructure of untrusted storage servers | Trusted third-party free protocol | Unauthorized parties (attackers) or a small set of colluding servers cannot gain access to the stored data |
[91] | Two-factor authentication | Voice-controlled digital banking and online payments | Authentication service protocol with two-factor authentication | Voice assistants to enable financial and commercial operations which require authentication with an increased level of security |
[92] | Honeypot | Tracking unusual methods of attack | Kerberos authentication system, VPC (Virtual Private Cloud), VPN (Virtual Private Network), and EFS (Elastic File System) | Seize, recognize, and duplicate the hacker behavior |
[93] | Honeypot | Hardware failure, web hosting, and space and memory allocation of data, direct or indirect data loss | Honeypot on third-party cloud vendor servers | Honeypot is implemented in a file-sharing application which is deployed on cloud server |
[94] | Changing cloud servers | Data loss control by the data owner | Verifiable data storage and secure data deduplication | To reduce the cost of data management |
[95] | Changing cloud servers | Computing power or storage capacity | Qualitative in-depth examination of companies’ attitudes towards security | Cost-saving and data processing |
[96] | Self-adaptive approach | To detect abnormalities | Active Bundle (AB), a distributed self-protecting entity, wrapped with policy enforcement engine | To grant or limit permissions to their AB peers and provide them with access to anonymized data |
Ref. | Category | Problems | Method | Achievements |
---|---|---|---|---|
[97] | Self-adaptive approach | Cyber-resiliency concepts | Continuous trust restoration concept | To consider cyber-resiliency and to incorporate it early in the design process |
[98] | Self-adaptive approach | Key exposures | Third-party auditor (TPA) | Auditing procedure with key exposure resistance as transparent as possible for the client |
[99] | Self-adaptive approach | Computation overhead for users’ data integrity | Third-party medium (TPM) to perform time-consuming operations | Time-efficient decryption |
[100] | Self-adaptive approach | Secret key burden | Third-party auditor (TPA) | Reduces the local burden on the client |
[101] | Ring signatures | Deduplication problems with data confidentiality | multiple key servers (KSs) | To construct an inter-KS deduplication algorithm, cloud storage service provider can perform deduplication over ciphertexts |
[102] | Ring signatures | Data sharing in cloud storage | ID-based public shared data integrity auditing scheme | Secure against an untrusted cloud server and also preserves data privacy against the public verifier |
[103] | Ring signatures | Requires the provision for user revocation | CDH-based ring signature and vector commitment | Dynamic data in untrusted cloud servers with provisions for privacy preserving |
[104] | Ring signatures | Data sharing | Homomorphic authenticators | To reduce the space used to store such verification information |
[105] | Runtime auditing | Cloud storage and access control | ABE-based techniques | Secure ciphertext deduplication scheme based on a classical CP-ABE scheme by eliminating the duplicated secrets and adding additional randomness to ciphertext |
[106] | Runtime auditing | Lack of transparency and accountability | Runtime security auditing framework including RBAC, ABAC, SSO, and OpenStack | Reducing the response time to perform the costly operations only once, and efficient runtime verification |
[107] | Runtime auditing | User access control | Authentication, authorization, and accounting (AAA) | To secure the lower layer of cloud infrastructure |
[108] | Runtime auditing | Computational and storage cost for healthcare data | Ciphertext policy Attribute-based Encryption (CP-ABE) | To reduce computational and storage power and semitrusted third parties, ensuring local computations |
[109] | Revocation keys | Execution time or the cost of running the applications | Service placement algorithm | Reduce execution time and running cost of application due to user’s mobility |
[110] | Revocation keys | Storing and processing of digital records | Shamir’s Secret Share (SSS) scheme | Avoid complex mathematical operations and ensure fault tolerance |
Ref. | Category | Problems | Method | Achievements |
---|---|---|---|---|
[111] | Revocation keys | To ensure shared data integrity | Public auditing mechanism | To resign blocks during user revocation, a public verifier to audit the integrity of shared data without retrieving the entire data, and ability to support batch auditing |
[112] | Revocation keys | To reveal user secrets or confidential data on the cloud | Cloud storage encryption scheme | To ensure user privacy is securely protected |
[113] | Revocation keys | Collision resistance of hashing keys | Chameleon hash function | To improve collision resistance of hashing keys |
[114] | Revocation keys | Data utility | Distributed servers, secret sharing, FHE, and chameleon hash functions | Long-term privacy-preserving computations for encrypted data and is secure even after a device-key is compromised |
[115] | Revocation keys | Cloud server authorization | Privacy-preserving broker-ABE scheme for multiple CCPSs | Reduce computational burden, policy embedding task to the broker, and protect data privacy |
[116] | Security model as a service | Tenancy and flexibility | - | To protect cloud infrastructure and provide flexibility to tenants to have additional security functionalities |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dawood, M.; Tu, S.; Xiao, C.; Alasmary, H.; Waqas, M.; Rehman, S.U. Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry 2023, 15, 1981. https://doi.org/10.3390/sym15111981
Dawood M, Tu S, Xiao C, Alasmary H, Waqas M, Rehman SU. Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry. 2023; 15(11):1981. https://doi.org/10.3390/sym15111981
Chicago/Turabian StyleDawood, Muhammad, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, and Sadaqat Ur Rehman. 2023. "Cyberattacks and Security of Cloud Computing: A Complete Guideline" Symmetry 15, no. 11: 1981. https://doi.org/10.3390/sym15111981
APA StyleDawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (2023). Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry, 15(11), 1981. https://doi.org/10.3390/sym15111981