This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Insecurity of Cloud Utility Models
March-April 2013 (vol. 15 no. 2)
pp. 22-27
Joseph Idziorek, Iowa State University
Mark F. Tannian, Iowa State University
Doug Jacobson, Iowa State University
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's financial burden.
Index Terms:
Cloud computing,Pricing,Computational modeling,Web servers,Computer crime,Quality of service,Bandwidth,information technology,fraudulent resource consumption attack,public cloud computing,utility pricing model,security,DDoS,prevention,detection,attribution,mitigation
Citation:
Joseph Idziorek, Mark F. Tannian, Doug Jacobson, "The Insecurity of Cloud Utility Models," IT Professional, vol. 15, no. 2, pp. 22-27, March-April 2013, doi:10.1109/MITP.2012.43
Usage of this product signifies your acceptance of the Terms of Use.