Cloud computing security: a taxonomy, threat detection and mitigation techniques

被引:1
作者
Rani P. [1 ]
Singh S. [1 ]
Singh K. [2 ]
机构
[1] Computer Science and Engineering Department, Deenbandhu Chhotu Ram University of Science and Technology, Sonipat
[2] Computer Engineering Department, Seth Jai Parkash Polytechnic, Yamuna Nagar
关键词
APIs; Cloud computing; DDoS; HDFS; mapreduce; security threats;
D O I
10.1080/1206212X.2024.2319937
中图分类号
学科分类号
摘要
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-based computing provides services like sharing resources e.g. network, storage, applications and software through the Internet. Cloud customers can access these services according to their need and pay only for those services which they utilize. Almost every industrial sector like banking, retail, education, healthcare, manufacturing and businesses is adopting cloud techniques within their enterprise either privately or in sharing with other enterprises. However, many security issues must be resolved because they are a barrier in adopting this fast-growing technology. This paper reviews various threats on cloud computing like distributed denial of service attack, spoofing attacks (e.g. ARP Spoofing, IP Spoofing, DNS Spoofing), man-in-the middle attack, data loss, data breach, reused IP address attack, malicious insiders, insecure interfaces & APIs etc. These security issues prevent users from adopting cloud services. This study presents various detection and prevention methods to address cloud security concerns. The effectiveness of each strategy is then analyzed based on its attributes, benefits and drawbacks. Deep learning and machine learning algorithms produce more precise findings for both known and unidentified attack patterns. © 2024 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:348 / 361
页数:13
相关论文
共 32 条
[1]  
Zulifquar I., Anayat S., Kharal I., A review of data security challenges and their solutions in cloud computing, Int J Inf Eng Electron Bus, 13, 3, pp. 30-38, (2021)
[2]  
Raghavendran C.H.V., Naga Satish G., Suresh Varma P., Et al., A study on cloud computing services, Conf Proc 2016 Int J Eng Res Technol (IJERT), 34
[3]  
Aldossary S., Allen W., Data security, privacy, availability, and integrity in cloud computing: issues and current solutions, Int J Adv Comput Sci Appl, 7, 4, pp. 485-498, (2016)
[4]  
Ghazia M.R., Gangodkar D., Hadoop, MapReduce and HDFS: a developers perspective, Procedia Comput Sci, 48, pp. 45-50, (2015)
[5]  
5 Google Introduces Cloud Storage Connector for Hadoop Big Data Workloads. Available from
[6]  
Nassif A.B., Talib M.A., Nasir Q., Et al., Machine learning for anomaly detection: A systematic review, IEEE, 9, pp. 78658-78700, (2021)
[7]  
Ramachandra G., Iftikhar M., Khan F.A., A comprehensive survey on security in cloud computing, Science direct 3rd International workshop on cyber security and digital investigation (CSDI 2017)
[8]  
Monika G., Kalpana Y., Data security is the major issue in cloud computing, Indian J Sci Technol, 9, 43, pp. 1-7, (2016)
[9]  
Kazim M., Zhu S.Y., A survey on top security threats in cloud computing, Int J Adv Comput Sci Appl, 6, 3, pp. 109-113, (2015)
[10]  
Amara N., Zhiqui H., Ali A., Cloud computing security threats and attacks with their mitigation techniques, 2017 International conference on cyber-enabled distributed computing and knowledge discovery