Security threats and mitigation techniques affecting trust computation in cloud computing

被引:0
|
作者
Saraf, Vinod [1 ]
Pachghare, Vinod [1 ]
机构
[1] COEP Technol Univ, Dept Comp Engn, Pune 411005, Maharashtra, India
关键词
Cloud computing; CSP; IaaS; PaaS; SaaS; Malicious; Attacker; Vulnerability;
D O I
10.47974/JDMSC-1970
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cloud Computing is the big evolution in the Information Technology industry. From giant organizations to small retail shops, everyone is moving to the cloud. Till now the Zettabytes of data are already migrated to cloud from private systems, and it is still growing. The actual concern starts when the data is being transferred, stored in some cloud storage, and then accessed. Attackers may attack with various techniques and can steal your data leading to severe security issues. Cloud Service Providers (CSP) must have a robust mechanism to protect their cloud resources from such attacks and ensure the data confidentiality, integrity, and security. If there are any loopholes, it will badly affect the trust computation of that CSP. In this paper we have done a comprehensive study and analysis of the threats in cloud computing which can affect the trust computation of CSPs and discussed the mitigations to those threats
引用
收藏
页码:1161 / 1172
页数:12
相关论文
共 50 条
  • [1] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [2] Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (03) : 50 - 64
  • [3] A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
    Alouffi, Bader
    Hasnain, Muhammad
    Alharbi, Abdullah
    Alosaimi, Wael
    Alyami, Hashem
    Ayaz, Muhammad
    IEEE ACCESS, 2021, 9 : 57792 - 57807
  • [4] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [5] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [6] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [7] Cloud computing security: a taxonomy, threat detection and mitigation techniques
    Rani P.
    Singh S.
    Singh K.
    International Journal of Computers and Applications, 2024, 46 (05) : 348 - 361
  • [8] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [9] Security threats of virtualization in cloud computing
    Wang, H. (permutation@163.com), 1600, Huazhong University of Science and Technology (40):
  • [10] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,