Security threats and mitigation techniques affecting trust computation in cloud computing

被引:0
|
作者
Saraf, Vinod [1 ]
Pachghare, Vinod [1 ]
机构
[1] COEP Technol Univ, Dept Comp Engn, Pune 411005, Maharashtra, India
关键词
Cloud computing; CSP; IaaS; PaaS; SaaS; Malicious; Attacker; Vulnerability;
D O I
10.47974/JDMSC-1970
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cloud Computing is the big evolution in the Information Technology industry. From giant organizations to small retail shops, everyone is moving to the cloud. Till now the Zettabytes of data are already migrated to cloud from private systems, and it is still growing. The actual concern starts when the data is being transferred, stored in some cloud storage, and then accessed. Attackers may attack with various techniques and can steal your data leading to severe security issues. Cloud Service Providers (CSP) must have a robust mechanism to protect their cloud resources from such attacks and ensure the data confidentiality, integrity, and security. If there are any loopholes, it will badly affect the trust computation of that CSP. In this paper we have done a comprehensive study and analysis of the threats in cloud computing which can affect the trust computation of CSPs and discussed the mitigations to those threats
引用
收藏
页码:1161 / 1172
页数:12
相关论文
共 50 条
  • [11] Security Threats in Cloud Computing Environments
    Lee, Kangchan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 25 - 32
  • [12] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [13] A Classification and Characterization of Security Threats in Cloud Computing
    Islam, Tariqul
    Manivannan, D.
    Zeadally, Sherali
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 1 - 17
  • [14] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111
  • [15] Various Security Threats and Their Solutions In Cloud Computing
    Barnwal, Anil
    Pugla, Satyakam
    Jangade, Rajesh
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 758 - 764
  • [16] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [17] A survey on top security threats in cloud computing
    Kazim, Muhammad
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (03) : 109 - 113
  • [18] Trust Model for Computing Security of Cloud
    Rathi, Snehal R.
    Kolekar, Vikas K.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [19] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [20] Cloud Computing Threats and Provider Security Assessment
    Yu, Huiming
    Williams, Ken
    Yuan, Xiaohong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 238 - 250