A Survey for Cloud Application Programming Interface Security: Threats and Protection br

Journal of Electronics & Information Technology(2023)

引用 0|浏览10
暂无评分
摘要
n the cloud era, cloud Application Programming Interface (API) is the best carrier for servicedelivery, capability replication and data output. However, cloud API increases the exposure and attack surfaceof cloud application while opening up services and data. Through data hijacking, traffic analysis and othertechnologies, attackers can obtain the key resources of the target cloud API, so as to identify the identity andbehavior of users, or even directly cause the paralysis of the underlying system. Currently, there are many typesof attacks against cloud APIs, and their threats and protection methods are different. However, the existingresearches lack a systematic summary for cloud API attack and protection methods. In this paper, a detailsurvey on the threats and protection methods faced by cloud API is conducted. Firstly, the evolution and theclassification of cloud API are analyzed. The vulnerability of cloud API and the importance of cloud APIsecurity research are then discussed. Furthermore, a systematical cloud API security research framework isproposed, which covers six aspects: identity authentication, cloud API Distributed Denial of Service (DDoS)attack protection, replay attack protection, Man-In-The-Middle (MITM) attack protection, injection attackprotection and sensitive data protection. In addition, the necessity of Artificial Intelligence (AI) protection forcloud API is discussed. Finally, the future challenges and development trends of cloud API protection are presented
更多
查看译文
关键词
Cloud Application Programming Interface (API),Cloud API vulnerability,Cloud API security,Cloud API attack,Cloud API protection
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要