Security threats and mitigation techniques affecting trust computation in cloud computing

被引:0
|
作者
Saraf, Vinod [1 ]
Pachghare, Vinod [1 ]
机构
[1] COEP Technol Univ, Dept Comp Engn, Pune 411005, Maharashtra, India
关键词
Cloud computing; CSP; IaaS; PaaS; SaaS; Malicious; Attacker; Vulnerability;
D O I
10.47974/JDMSC-1970
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cloud Computing is the big evolution in the Information Technology industry. From giant organizations to small retail shops, everyone is moving to the cloud. Till now the Zettabytes of data are already migrated to cloud from private systems, and it is still growing. The actual concern starts when the data is being transferred, stored in some cloud storage, and then accessed. Attackers may attack with various techniques and can steal your data leading to severe security issues. Cloud Service Providers (CSP) must have a robust mechanism to protect their cloud resources from such attacks and ensure the data confidentiality, integrity, and security. If there are any loopholes, it will badly affect the trust computation of that CSP. In this paper we have done a comprehensive study and analysis of the threats in cloud computing which can affect the trust computation of CSPs and discussed the mitigations to those threats
引用
收藏
页码:1161 / 1172
页数:12
相关论文
共 50 条
  • [21] IT Security Threats in Cloud Computing Sourcing Model
    Rot, Artur
    Sobinska, Malgorzata
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
  • [22] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327
  • [23] Situational Crime Prevention and the Mitigation of Cloud Computing Threats
    Vidal, Chaz
    Choo, Kim-Kwang Raymond
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 218 - 233
  • [24] A Study on Security Mitigation Models in Cloud Computing
    Tanna, Maulik
    Sridaran, R.
    Dobariya, Ashwin
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 446 - 450
  • [25] Mitigation for cloud computing security risks and governance
    Jabez, J.
    Narmadha, R.
    Porkodi, S.
    Devi, L.
    International Journal of Cloud Computing, 2022, 11 (5-6) : 560 - 567
  • [26] Cyber Security Threats and Mitigation Techniques for Multifunctional Devices
    Mutemwa, Muyowa
    Mouton, Francois
    2018 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY (ICTAS), 2018,
  • [27] Cloud computing security: Attacks, threats, risk and solutions
    Kaushik S.
    Gandhi C.
    Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) : 50 - 71
  • [28] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537
  • [29] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
  • [30] Security Threats in Cloud Computing Models: Domains and Proposals
    Revoredo da Silva, Carlo Marcelo
    Costa da Silva, Jose Lutiano
    Rodrigues, Ricardo Batista
    Medeiros Campos, Glaucia Melissa
    do Nascimento, Leandro Marques
    Garcia, Vinicius Cardoso
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 383 - 389