Prominent Security Vulnerabilities in Cloud Computing

被引:0
|
作者
Alquwayzani, Alanoud [1 ]
Aldossri, Rawabi [1 ]
Frikha, Mounir [1 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun CCSIT, Al Hasa, Saudi Arabia
关键词
Cloud computing; vulnerabilities; cloud security; cloud misconfigurations; data loss; threats; PRIVACY; FOG;
D O I
10.14569/IJACSA.2024.0150281
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This research study examines the significant security vulnerabilities and threats in cloud computing, analyzes their potential consequences for enterprises, and proposes effective solutions for mitigating these vulnerabilities. This paper discusses the increasing significance of cloud security in a time characterized by rapid data expansion and technological progress. The paper examines prevalent vulnerabilities in cloud computing, including cloud misconfigurations, data leakage, shared technology threats, and insider threats. It emphasizes the necessity of adopting a proactive and comprehensive approach to ensure cloud security. The report places significant emphasis on the shared responsibility paradigm, adherence to industry laws, and the dynamic nature of cybersecurity threats. The situation necessitates the cooperation of researchers, cybersecurity professionals, and enterprises to proactively address these difficulties. This partnership aims to provide a thorough manual for organizations aiming to bolster their cloud security measures and safeguard valuable data in an ever-evolving digital landscape.
引用
收藏
页码:803 / 813
页数:11
相关论文
共 50 条
  • [1] Vulnerabilities and storage security in Cloud Computing
    Derfouf, Mostapha
    Mimouni, Amina
    Eleuldj, Mohsine
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 295 - 299
  • [2] Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Computing
    Shah, Masood
    Shah, Abdul Salam
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (07): : 13 - 22
  • [3] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [4] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
  • [5] Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
    Paikrao, Rahul L.
    Patil, Varsha H.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 559 - 562
  • [6] Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
    Dahbur, Kamal
    Mohammad, Bassil
    Tarakji, Ahmad Bisher
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (03) : 1 - 11
  • [7] Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing
    Bhagat, Swapnil P.
    Patil, Vikram S.
    Meshram, Bandu B.
    INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 : 625 - 634
  • [8] Cloud Computing Vulnerabilities Analysis
    Zamfiroiu, Alin
    Petre, Ionut
    Boncea, Radu
    2019 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTERNET OF THINGS (CCIOT 2019), 2019, : 48 - 53
  • [9] Understanding Cloud Computing Vulnerabilities
    Grobauer, Bernd
    Walloschek, Tobias
    Stoecker, Elmar
    IEEE SECURITY & PRIVACY, 2011, 9 (02) : 50 - 57
  • [10] Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment
    Peng P.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)