Cloud computing security based on OWASP

被引:0
|
作者
Alobaidi, AbdulAzeez R. [1 ]
Nuimi, Zinah N. [2 ]
机构
[1] Imam Jaafar Al Sadiq Univ, Fac Informat Technol, Dept Comp Tech Engn, Baghdad, Iraq
[2] Univ Mayasan, Fac Engn, Dept Elect Engn, Mayasan, Iraq
来源
5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022) | 2022年
关键词
cloud computing; cloud security; security; OWASP; THREATS;
D O I
10.1109/ICCI54321.2022.9756064
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.
引用
收藏
页码:22 / 28
页数:7
相关论文
共 50 条
  • [21] OWASP Inspired Mobile Security
    Acharya, Subrata
    Ehrenreich, Branden
    Marciniak, James
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE, 2015, : 782 - 784
  • [22] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [23] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [24] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [25] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
  • [26] Agent Based Security for Cloud Computing using Obfuscation
    Govinda, K.
    Sathiyamoorthy, E.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 125 - 129
  • [27] Research on Cloud Computing Security Based on the Remote Attestation
    Xie, Fu
    Du, Yunyun
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2657 - 2664
  • [28] Construction of Digital Campus Security Based on Cloud Computing
    Tang, Lianzhang
    Xiao, Zhineng
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 573 - 576
  • [29] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [30] Designing of Cryptography Based Security System for Cloud Computing
    Sengupta, Nandita
    Holmes, Jeffrey
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 52 - 57