The Security Risks of Cloud Computing

被引:2
|
作者
Choi, Myeonggil [1 ]
机构
[1] Chung Ang Univ, Dept Business Adm, Seoul, South Korea
关键词
cloud systems; security vulnerability; cryptography; hardware weakness; key management;
D O I
10.1109/CSE/EUC.2019.00069
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls in terms of secure cryptography. For achieving the research aims, this paper analyzes technological security vulnerability, operational weakness and suggests secure ways for cloud systems.
引用
收藏
页码:330 / 330
页数:1
相关论文
共 50 条
  • [1] Security Risks and their Management in Cloud Computing
    Khan, Afnan Ullah
    Oriol, Manuel
    Kiran, Mariam
    Jiang, Ming
    Djemame, Karim
    [J]. 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [2] Evaluating Risks in Cloud Computing: Security Perspective
    Dhingra, Amit Kumar
    Rai, Dinesh
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 533 - 536
  • [3] Cloud Computing: Potential Risks and Security Approaches
    Ben Rebah, Hassen
    Ben Sta, Hatem
    [J]. E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2016), 2018, 208 : 69 - 78
  • [4] Cloud Computing: Benefits, Risks and Recommendations for Information Security
    Catteddu, Daniele
    [J]. WEB APPLICATION SECURITY, 2010, 72 : 17 - 17
  • [5] IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing.
    Vinaja, Roberto
    [J]. JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2013, 16 (03) : 82 - 84
  • [6] Identifying the security risks associated with governmental use of cloud computing
    Paquette, Scott
    Jaeger, Paul T.
    Wilson, Susan C.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2010, 27 (03) : 245 - 253
  • [7] Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
    Dahbur, Kamal
    Mohammad, Bassil
    Tarakji, Ahmad Bisher
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (03) : 1 - 11
  • [8] Research on Security Risks and Prevention of Cloud Computing in Smart Grid
    Chang, Tao
    Zhou, Ai-hua
    Zhu, Yun-you
    Deng, Song
    Ding, Jie
    Rao, Wei
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND TECHNOLOGY (ICCST 2015), 2015, : 129 - 134
  • [9] Towards Analyzing Data Security Risks in Cloud Computing Environments
    Sangroya, Amit
    Kumar, Saurabh
    Dhok, Jaideep
    Varma, Vasudeva
    [J]. INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 255 - 265
  • [10] Model of assessment of risks of information security in the environment of cloud computing
    Djuraev, R. X.
    Umirzakov, B. M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT), 2016,