Trust Issues That Create Threats for Cyber Attacks in Cloud Computing

被引:21
|
作者
Khorshed, Md Tanzim [1 ]
Ali, A. B. M. Shawkat [1 ]
Wasimi, Saleh A. [1 ]
机构
[1] Cent Queensland Univ, Sch Informat & Commun Technol, Rockhampton, Qld 4702, Australia
关键词
Security; threats; machine learning; trust; cloud computing;
D O I
10.1109/ICPADS.2011.156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their customers' additional insight and tools to proactively protect themselves from known or perhaps even unknown security issues that follow the same patterns.
引用
收藏
页码:900 / 905
页数:6
相关论文
共 50 条
  • [2] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [3] Cyber security threats, challenges and defence mechanisms in cloud computing
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    [J]. IET COMMUNICATIONS, 2020, 14 (07) : 1185 - 1191
  • [4] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [5] Security Issues and Threats According to the Attribute of Cloud Computing
    Lee, Hyangjin
    Kim, Jeeyeon
    Lee, Youngsook
    Won, Dongho
    [J]. COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 101 - +
  • [6] Establishing Trust Despite Attacks in Cloud Computing: A Survey
    Chandni, M.
    Sowmiya, N. P.
    Mohana, S.
    Sandhya, M. K.
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 712 - 716
  • [7] Cyber resilience and cyber security issues of intelligent cloud computing systems
    Abdullayeva, Fargana
    [J]. RESULTS IN CONTROL AND OPTIMIZATION, 2023, 12
  • [8] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    [J]. The Journal of Supercomputing, 2020, 76 : 9493 - 9532
  • [9] A survey on security challenges in cloud computing: issues, threats, and solutions
    Tabrizchi, Hamed
    Kuchaki Rafsanjani, Marjan
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (12): : 9493 - 9532
  • [10] Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
    Dahbur, Kamal
    Mohammad, Bassil
    Tarakji, Ahmad Bisher
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (03) : 1 - 11