Cloud computing security based on OWASP

被引:0
|
作者
Alobaidi, AbdulAzeez R. [1 ]
Nuimi, Zinah N. [2 ]
机构
[1] Imam Jaafar Al Sadiq Univ, Fac Informat Technol, Dept Comp Tech Engn, Baghdad, Iraq
[2] Univ Mayasan, Fac Engn, Dept Elect Engn, Mayasan, Iraq
来源
5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022) | 2022年
关键词
cloud computing; cloud security; security; OWASP; THREATS;
D O I
10.1109/ICCI54321.2022.9756064
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.
引用
收藏
页码:22 / 28
页数:7
相关论文
共 50 条
  • [11] Security in cloud computing
    International Journal of Information Security, 2014, 13 : 95 - 96
  • [12] Security for Cloud Computing
    Nazeer, Shahrin A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [13] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [14] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [15] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [16] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [17] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [18] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [19] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [20] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600