Security threats and mitigation techniques affecting trust computation in cloud computing

被引:0
|
作者
Saraf, Vinod [1 ]
Pachghare, Vinod [1 ]
机构
[1] COEP Technol Univ, Dept Comp Engn, Pune 411005, Maharashtra, India
关键词
Cloud computing; CSP; IaaS; PaaS; SaaS; Malicious; Attacker; Vulnerability;
D O I
10.47974/JDMSC-1970
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cloud Computing is the big evolution in the Information Technology industry. From giant organizations to small retail shops, everyone is moving to the cloud. Till now the Zettabytes of data are already migrated to cloud from private systems, and it is still growing. The actual concern starts when the data is being transferred, stored in some cloud storage, and then accessed. Attackers may attack with various techniques and can steal your data leading to severe security issues. Cloud Service Providers (CSP) must have a robust mechanism to protect their cloud resources from such attacks and ensure the data confidentiality, integrity, and security. If there are any loopholes, it will badly affect the trust computation of that CSP. In this paper we have done a comprehensive study and analysis of the threats in cloud computing which can affect the trust computation of CSPs and discussed the mitigations to those threats
引用
收藏
页码:1161 / 1172
页数:12
相关论文
共 50 条
  • [41] Security Techniques for Cloud Computing Environment
    Garg, Prachi
    Goel, Sandeep
    Sharma, Avinash
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 771 - 776
  • [42] Trust Issues That Create Threats for Cyber Attacks in Cloud Computing
    Khorshed, Md Tanzim
    Ali, A. B. M. Shawkat
    Wasimi, Saleh A.
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 900 - 905
  • [43] From Threats Subverting Cloud Security to a Secure Trust Paradigm
    Bhattacharya, S.
    Kumar, C. R. S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 510 - 515
  • [44] LoRaWAN security survey: Issues, threats and possible mitigation techniques
    Noura, Hassan
    Hatoum, Tarif
    Salman, Ola
    Yaacoub, Jean-Paul
    Chehab, Ali
    INTERNET OF THINGS, 2020, 12
  • [45] Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey
    Pandey, Gaurav Kumar
    Gurjar, Devendra Singh
    Nguyen, Ha H.
    Yadav, Suneel
    IEEE ACCESS, 2022, 10 : 112858 - 112897
  • [46] Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques
    Munir, Arslan
    Blasch, Erik
    Aved, Alexander
    Ratazzi, Edward Paul
    Kong, Joonho
    IEEE SECURITY & PRIVACY, 2022, 20 (04) : 51 - 60
  • [47] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    The Journal of Supercomputing, 2020, 76 : 9493 - 9532
  • [48] A Case Study for the Cloud Computing Security Threats in a Governmental Organization
    Albakri, Sameer Hasan
    Shanmgam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 452 - 457
  • [49] Comparative Analysis of Security Threats in Mobile Cloud Computing Environment
    Vishal
    Kaur, Bikrampal
    Jangra, Surender
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 385 - 390
  • [50] Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures
    Brohi, Sarfraz Nawaz
    Bamiah, Mervat Adib
    Brohi, Muhammad Nawaz
    Kamran, Rukshanda
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 151 - 155