Security threats and mitigation techniques affecting trust computation in cloud computing

被引:0
|
作者
Saraf, Vinod [1 ]
Pachghare, Vinod [1 ]
机构
[1] COEP Technol Univ, Dept Comp Engn, Pune 411005, Maharashtra, India
关键词
Cloud computing; CSP; IaaS; PaaS; SaaS; Malicious; Attacker; Vulnerability;
D O I
10.47974/JDMSC-1970
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cloud Computing is the big evolution in the Information Technology industry. From giant organizations to small retail shops, everyone is moving to the cloud. Till now the Zettabytes of data are already migrated to cloud from private systems, and it is still growing. The actual concern starts when the data is being transferred, stored in some cloud storage, and then accessed. Attackers may attack with various techniques and can steal your data leading to severe security issues. Cloud Service Providers (CSP) must have a robust mechanism to protect their cloud resources from such attacks and ensure the data confidentiality, integrity, and security. If there are any loopholes, it will badly affect the trust computation of that CSP. In this paper we have done a comprehensive study and analysis of the threats in cloud computing which can affect the trust computation of CSPs and discussed the mitigations to those threats
引用
收藏
页码:1161 / 1172
页数:12
相关论文
共 50 条
  • [31] Security Issues and Threats According to the Attribute of Cloud Computing
    Lee, Hyangjin
    Kim, Jeeyeon
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 101 - +
  • [32] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 2517 - 2527
  • [33] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [34] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [35] Cloud Computing Security and Challenges: Issues, Threats, and Solutions
    Alrasheed, Sadeem Hamad
    Alhariri, Majid Aied
    Adubaykhi, Sulaiman Abdulaziz
    El Khediri, Salim
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 166 - 172
  • [36] Special issue on trust and security in cloud computing
    Ko, Ryan K. L.
    Kirchberg, Markus
    Lee, Bu Sung
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2183 - 2184
  • [37] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [38] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [39] Security and privacy for storage and computation in cloud computing
    Wei, Lifei
    Zhu, Haojin
    Cao, Zhenfu
    Dong, Xiaolei
    Jia, Weiwei
    Chen, Yunlu
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2014, 258 : 371 - 386
  • [40] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419