Saudi cloud infrastructure: a security analysis

被引:6
|
作者
Rajeh, Wahid [1 ,2 ]
Jin, Hai [1 ]
Zou, Deqing [1 ]
机构
[1] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Big Data Technol & Syst Lab, Cluster & Grid Comp Lab,Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Univ Tabuk, Sch Comp & Informat Technol, Tabuk 71491, Saudi Arabia
关键词
cloud security; vulnerability detection; web security; Saudi infrastructure; cloud service;
D O I
10.1007/s11432-016-0322-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing demand and dependence upon cloud services have garnered an increasing level of threat to user data and security. Some of such critical web and cloud platforms have become constant targets for persistent malicious attacks that attempt to breach security protocol and access user data and information in an unauthorized manner. While some of such security compromises may result from insider data and access leaks, a substantial proportion continues to remain attributed to security flaws that may exist within the core web technologies with which such critical infrastructure and services are developed. This paper explores the direct impact and significance of security in the Software Development Life Cycle (SDLC) through a case study that covers some 70 public domain web and cloud platforms within Saudi Arabia. Additionally, the major sources of security vulnerabilities within the target platforms as well as the major factors that drive and influence them are presented and discussed through experimental evaluation. The paper reports some of the core sources of security flaws within such critical infrastructure by implementation with automated security auditing and manual static code analysis. The work also proposes some effective approaches, both automated and manual, through which security can be ensured through-out the SDLC and safeguard user data integrity within the cloud.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Saudi cloud infrastructure: a security analysis
    Wahid Rajeh
    Hai Jin
    Deqing Zou
    [J]. Science China Information Sciences, 2017, 60
  • [2] Saudi cloud infrastructure: a security analysis
    Wahid RAJEH
    Hai JIN
    Deqing ZOU
    [J]. Science China(Information Sciences), 2017, 60 (12) : 152 - 164
  • [3] Safeguarding Cloud Computing Infrastructure: A Security Analysis
    Alenezi, Mamdouh
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 159 - 167
  • [4] Cloud Infrastructure Security
    Velev, Dimiter
    Zlateva, Plamena
    [J]. OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 140 - +
  • [5] ANALYSIS OF CLOUD COMPUTING SECURITY IN PERSPECTIVE OF SAUDI ARABIA
    AlHumaidan, Yara
    AlAjmi, Lama
    Aljamea, Moudhi
    Mahmud, Maqsood
    [J]. 2018 IEEE 20TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2018,
  • [6] Security Challenges and Analysis of Various Security Models for Cloud Computing Infrastructure
    Madhavan, P.
    Ravikumar, G.
    Ghosh, Shuvajyoti
    Shaw, Bernard
    Mondal, Arghadeep
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2019, 12 (02): : 14 - 18
  • [7] Security Problems in Cloud Infrastructure
    Djenna, Amir
    Batouche, Mohamed
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS, 2014,
  • [8] INFORMATION SECURITY MANAGEMENT FOR CLOUD INFRASTRUCTURE
    Tsaregorodtsev, A. V.
    Lvovich, I. Ya.
    Shikhaliev, M. S.
    Zelenina, A. N.
    Choporov, O. N.
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (03): : 91 - 100
  • [9] A SECURED CLOUD STORAGE TECHNIQUE TO IMPROVE SECURITY IN CLOUD INFRASTRUCTURE
    SenthilKumar, M.
    Kumar, M.
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 97 - 102
  • [10] A Layered Security Approach for Cloud Computing Infrastructure
    Yildiz, Mehmet
    Abawajy, Jemal
    Ercan, Tuncay
    Bernoth, Andrew
    [J]. 2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 763 - +