Cloud computing security based on OWASP

被引:0
|
作者
Alobaidi, AbdulAzeez R. [1 ]
Nuimi, Zinah N. [2 ]
机构
[1] Imam Jaafar Al Sadiq Univ, Fac Informat Technol, Dept Comp Tech Engn, Baghdad, Iraq
[2] Univ Mayasan, Fac Engn, Dept Elect Engn, Mayasan, Iraq
来源
5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022) | 2022年
关键词
cloud computing; cloud security; security; OWASP; THREATS;
D O I
10.1109/ICCI54321.2022.9756064
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.
引用
收藏
页码:22 / 28
页数:7
相关论文
共 50 条
  • [1] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [2] Security Outlook for Cloud Computing: A Proposed Architectural-Based Security Classification for Cloud Computing
    Khari, Manju
    Gupta, Sana
    Kumar, Manoj
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2153 - 2158
  • [3] The Security Issue of WSNs Based on Cloud Computing
    Xie, Yuanpeng
    Zhang, Jinsong
    Fu, Ge
    Wen, Hong
    Han, Qiyi
    Zhu, Xiping
    Jiang, Yixin
    Guo, Xiaobin
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 383 - +
  • [4] Monitoring based security approach for cloud computing
    Yadav A.
    Ritika
    Garg M.L.
    Ingenierie des Systemes d'Information, 2019, 24 (06): : 611 - 617
  • [5] Policy Based Management for Security in Cloud Computing
    Waller, Adrian
    Sandy, Ian
    Power, Eamonn
    Aivaloglou, Efthimia
    Skianis, Charalampos
    Munoz, Antonio
    Mana, Antonio
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 130 - +
  • [6] Research on the Optimal Design of Computing Security based on Cloud Computing
    Yang, Fan
    Rao, Yutai
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 421 - 426
  • [7] A Cloud Computing Security Model Based on Noninterference
    Lü Congdong
    QIAN Gang
    CHEN Tao
    Wuhan University Journal of Natural Sciences, 2019, 24 (03) : 194 - 200
  • [8] A NOVEL BASED SECURITY ARCHITECTURE OF CLOUD COMPUTING
    Gupta, Subham Kumar
    Rawat, Seema
    Kumar, Praveen
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [9] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [10] Research on Security of the Client Based on Cloud Computing
    Xu Xiaoping
    Yan Junhu
    2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 1 - 6