|
Redifis 2012
Detection and Mitigation of MITM Attacks in Storage Cloud InfrastructuresKeywords: Cloud computing , MITM , attack , man-in-themiddle , SSL , arpON , mitigation , detection , security , storage , cloud , FTP Abstract: Cloud computing is changing IT service provision around the world, not only within large, but also small enterprises. These are benefited by tremendous advantages in cost reductionand customer satisfaction; however, behind this, there is a constant concern about risk management and vulnerability analysis when IT services are placed in the Cloud with thirdpartiesmanaging the security of the core-business infrastructure. Moreover, when moving to the Cloud, providers struggle to ensure high integrity, availability and confidentiality of informationbecause Cloud Services are still exposed to traditional threats due to the inherited protocols working underneath, which have not evolved as quick as these services. In this article, we briefly explainsome important concepts of Cloud Computing in order to understand the impact of ARP Spoofing, via a Man-In-The-Middle Attack (MITM) within a small experimental Storage Cloud environment so that a possible way to mitigate this particular problem to guarantee secure connections can be provided.
|