Proposed Solutions

  1. To Prevent Command and Malware Injection Attacks
  • Ensure the use of strong and secure designs of applications (Software Modules, Frameworks, Libraries)
  • If untrusted Application Programming Interface (API) are used make sure:
    • To avoid using special characters and instead use specific escape syntax for the interpreter.
    • Strict input validation must be applied as much as possible.
  • Authentication Standards
    • Security Assertion Markup Language (SAML): A standard which can manage the transfers of authentication between servers.
    • Extensible Access Control Markup Language (XACML): A standard to manage the establishment of authorizations.
  1. Solution to Denial-of-Service

    Solutions for DoS  includes advanced intrusion prevention and threat management systems, which combine firewalls, VPN, anti-spam, content filtering, and load balancing. Also monitor for unusual activity in the server could help prevent an DoS attack early on.

  2. Solution to Data Breach
  • Data encryption leads to solving hacking and efficient use of clouds safely.
  • Hybrid model clouds can prevent data from being used by others or leaking while having too much data storage and transferring.
  • There are various models that can be used for cloud computing to store data safely and effectively.