Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework

Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework

Jitendra Singh
Copyright: © 2021 |Volume: 11 |Issue: 4 |Pages: 15
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781799861799|DOI: 10.4018/IJCWT.2021100103
Cite Article Cite Article

MLA

Singh, Jitendra. "Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework." IJCWT vol.11, no.4 2021: pp.43-57. http://doi.org/10.4018/IJCWT.2021100103

APA

Singh, J. (2021). Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework. International Journal of Cyber Warfare and Terrorism (IJCWT), 11(4), 43-57. http://doi.org/10.4018/IJCWT.2021100103

Chicago

Singh, Jitendra. "Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework," International Journal of Cyber Warfare and Terrorism (IJCWT) 11, no.4: 43-57. http://doi.org/10.4018/IJCWT.2021100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Involvement of multiple cloud providers enhances the security complexity in cloud computing. Despite engaging best in class human and hardware resources, cyber-attacks in cloud paradigm continue to rise. This work aims to explore the cloud vulnerabilities that arise due to the multiple entry points. Underlying security threats are categorized into resources at providers' end, hardware security, transmission security, process security, and endpoint security. To mitigate the cyber-attacks in cloud, this work proposed a comprehensive multi-point-based framework that leverages the underlying hardware to strengthen the security at the user's end, internet service provider's end, and at the cloud data center. Security is further fortified by including the process level interaction at terminals. Framework is advanced enough to accommodate the vulnerable points of a system and a network. With the implementation of the proposed system, potential attacks can be detected during early state of penetration.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.