Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

147

Table 1 (continued)

Issues of security

Attacks

Affected service delivery

models

Responsible

characteristics of cloud

Threat to C-I-A-A-P

Directions of protection

Application-related

issues

– Application modification

– Application interruption

– Cross-VM attack

– DoS attack

– Privacy violations

– Hijacking of Session

– Impersonation

– Cross-site scripting

(XSS) attack

– Injection of SQL attack

PaaS, SaaS

Multi-tenancy, broad

network access,

pay-as-you-use pricing

model

Confidentiality,

integrity,

availability,

privacy

– Access control

– Strong authentication

– Use of bug-free

applications

– Use of firewall/IDS

– Isolation of application