Loading

Revisiting Cloud Security Threats: Repudiation Attack
Vaishali Singh1, S. K. Pandey2
1Vaishali Singh, Research Scholar-CS, Jagannath University, Asst. Prof., St. Xavier’s College, Jaipur.
2S. K. Pandey, Dept. of Electronics & Information Technology, Ministry of Communications & IT, Govt. of India, New Delhi, India.

Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 1790-1798 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6377018520/2020©BEIESP | DOI: 10.35940/ijrte.E6377.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Analysis of security threats and examining of existing mitigation techniques are considered as the major dimensions that need to be focused by next-generation cloud technology. These securities and privacy-based challenges are affecting most of the quality services and online data storage having huge network infrastructures and applications for information management. However, still the variant advantages are the success key of emerging cloud, but poses new security issues and reliability challenges for the users and their service applications. The main concern is an application-based cloud threats, which are not tracked properly and no user action logs are maintained for the evidences. This specially leads to the forging of identifications and manipulation in system actions. Nowadays the most common action observed by malicious attacker is to execute repudiation, where one of the parties involved in communication, denies that actually they have executed the particular conduct. Repudiation attack leads to the major legal actions on massive financial losses, which are not even legitimately proved due to the lack of evidences. Thus, the paper presents a broad indication of repudiation attack through analysis of prior security issues in a cloud environment. Wide-ranging reviews on the same have been presented. The study has tried to figure out the root cause of repudiation attack in order to come up with more suitable and satisfactory counter measures. The study also focuses on a variety of dimensions for future research study in the domain of repudiation based on the previous published works and industry /organization reports.
Keywords: Repudiation Attack, Threats, Audit Log, Timestamp, Digital Signature, eSign, Non-Repudiation.
Scope of the Article: Plant Cyber Security.