The document proposes a stealthy denial of service strategy against applications running in the cloud. It aims to exploit the cloud's flexibility by orchestrating slowly-increasing polymorphic attack patterns to avoid overloading the target system and prolong resource consumption, inflicting higher costs. The proposed system architecture includes modules for data owners, cloud servers, data consumers, and a threat model. It was presented by students to their professor.