Ancient be generated in order to incorporate newness. Possible

humans took a few million years to skate a step from inventing fire to
inventing wheel. A few thousand years to invent printing press. A few hundred
years to invent automobiles. And then a few decades to invent algorithm
operated machines like computers. Now every day the inventions proceeds one
more step. Technology is touching skies and these developments have taken no
more than a decade to grow rapidly.

        In the illustrated sequence of
interaction between two cloud services and two virtual servers, the main
ingredient of advancement is security. If the data is kept secured, a few
advanced versions of the systems can be generated in order to incorporate

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now


Possible Threats and
Attacks Occur Due to Program Maliciousness Outside the Cloud

        Now, if any type of program goes
malicious outside of the cloud, a few types of attacks could potentially take

1.      Traffic Eavesdropping: Traffic
eavesdropping occurs when data being transferred to or within a cloud (usually
from the cloud consumer to the cloud provider) is passively intercepted by a
malicious service agent for illegitimate information gathering purposes. Dawai
Sun (2011) and Guiran Chang (2011) in their paper state that the aim of this
attack is to directly compromise the confidentiality of the data and, possibly,
the confidentiality of the relationship between the cloud consumer and cloud
provider. Because of the passive nature of the attack, it can more easily go
undetected for extended periods of time.
of the attack: It can be justified by an anonymous attacker that is a
non-trusted cloud service consumer without permissions in the cloud. It
typically exists as an external software program that launches network-level
attacks through public networks. When anonymous attackers have limited
information on security policies and defenses, it can inhibit their ability to
formulate effective attacks. Therefore, anonymous attackers often resort to
committing acts like bypassing user accounts or stealing user credentials,
while using methods that either ensure anonymity or require substantial
resources for prosecution.


2.      Virtualization attack:
Virtualization provides multiple cloud consumers with access to IT resources
that share underlying hardware but are logically isolated from each other.
Because cloud providers grant cloud consumers administrative access to virtualize
IT resources (such as virtual servers), there is an inherent risk that cloud
consumers could abuse this access to attack the underlying physical IT


A virtualization attack exploits
vulnerability in the virtualization platform to jeopardize its confidentiality,
integrity, and/or availability. As per A. Bisong (2011) and M. Rahman (2011), here
a trusted attacker successfully accesses a virtual server to compromise its
underlying physical server. With public clouds, where a single physical IT
resource may be providing virtualized IT resources to multiple cloud consumers,
such an attack can have significant repercussions.
of the attack: Malicious insiders are human threat agents acting on
behalf of or in relation to the cloud provider. They are typically current or former
employees or third parties with access to the cloud provider’s premises. This
type of threat agent carries tremendous damage potential, as the malicious
insider may have administrative privileges for accessing cloud consumer IT


3.      Denial of service:
The objective of the denial of service (DoS) attack is to overload IT resources
to the point where they cannot function properly. Stated by Hassan Takabi
(2010), James B.D. Joshi (2010) and Gail-Joon Ahn (2010), this form of attack
is commonly launched in one of the following ways:

The workload on cloud services is
artificially increased with imitation messages or repeated communication

The network is overloaded with traffic to
reduce its responsiveness and cripple its performance.

Multiple cloud service requests are sent,
each of which is designed to consume excessive memory and processing resources.
Successful DoS attacks produce server degradation and/or failure.