Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
147
Table 1 (continued)
Issues of security
Attacks
Affected service delivery
models
Responsible
characteristics of cloud
Threat to C-I-A-A-P
Directions of protection
Application-related
issues
– Application modification
– Application interruption
– Cross-VM attack
– DoS attack
– Privacy violations
– Hijacking of Session
– Impersonation
– Cross-site scripting
(XSS) attack
– Injection of SQL attack
PaaS, SaaS
Multi-tenancy, broad
network access,
pay-as-you-use pricing
model
Confidentiality,
integrity,
availability,
privacy
– Access control
– Strong authentication
– Use of bug-free
applications
– Use of firewall/IDS
– Isolation of application