Revisiting Cloud Security Threats: Repudiation Attack

2020 International journal of recent technology and engineering  
Analysis of security threats and examining of existing mitigation techniques are considered as the major dimensions that need to be focused by next-generation cloud technology. These securities and privacy-based challenges are affecting most of the quality services and online data storage having huge network infrastructures and applications for information management. However, still the variant advantages are the success key of emerging cloud, but poses new security issues and reliability
more » ... nges for the users and their service applications. The main concern is an application-based cloud threats, which are not tracked properly and no user action logs are maintained for the evidences. This specially leads to the forging of identifications and manipulation in system actions. Nowadays the most common action observed by malicious attacker is to execute repudiation, where one of the parties involved in communication, denies that actually they have executed the particular conduct. Repudiation attack leads to the major legal actions on massive financial losses, which are not even legitimately proved due to the lack of evidences. Thus, the paper presents a broad indication of repudiation attack through analysis of prior security issues in a cloud environment. Wide-ranging reviews on the same have been presented. The study has tried to figure out the root cause of repudiation attack in order to come up with more suitable and satisfactory counter measures. The study also focuses on a variety of dimensions for future research study in the domain of repudiation based on the previous published works and industry /organization reports.
doi:10.35940/ijrte.e6377.018520 fatcat:kpqvndgft5ghhk2yxhgg2jv4tm