Cloud computing security based on OWASP

被引:0
|
作者
Alobaidi, AbdulAzeez R. [1 ]
Nuimi, Zinah N. [2 ]
机构
[1] Imam Jaafar Al Sadiq Univ, Fac Informat Technol, Dept Comp Tech Engn, Baghdad, Iraq
[2] Univ Mayasan, Fac Engn, Dept Elect Engn, Mayasan, Iraq
来源
5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022) | 2022年
关键词
cloud computing; cloud security; security; OWASP; THREATS;
D O I
10.1109/ICCI54321.2022.9756064
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.
引用
收藏
页码:22 / 28
页数:7
相关论文
共 50 条
  • [31] Security in Cloud-Computing-Based Mobile Health
    Albuquerque, Silas L.
    Gondim, Paulo R. L.
    IT PROFESSIONAL, 2016, 18 (03) : 37 - 44
  • [32] Linguistic-Based Security in Fog and Cloud Computing
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES, 2019, 29 : 120 - 127
  • [33] A cloud computing based system for cyber security management
    Xu, Guobin
    Yu, Wei
    Chen, Zhijiang
    Zhang, Hanlin
    Moulema, Paul
    Fu, Xinwen
    Lu, Chao
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2015, 30 (01) : 29 - 45
  • [34] The Cloud based Edge Computing with IoT Infrastructure and Security
    Velmurugadass, P.
    Dhanasekaran, S.
    Sasikala, S.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 30 - +
  • [35] Research on a security mechanism for cloud computing based on virtualization
    Du, Ye
    Zhang, Ruhui
    Li, Meihong
    TELECOMMUNICATION SYSTEMS, 2013, 53 (01) : 19 - 24
  • [36] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706
  • [37] Security and Strategies in Air Logistics Based on Cloud Computing
    Zhao, Ming
    Wu, Jing
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 449 - 452
  • [38] Network Security Evaluation Model Based on Cloud Computing
    Yang, Jin
    Wang, Cilin
    Yu, Le
    Liu, Caiming
    Peng, Lingxi
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 488 - 495
  • [39] Chaos based image encryption security in cloud computing
    Kumar, Sarvesh
    Srivastava, Prabhat Kumar
    Srivastava, Gaurav Kumar
    Singhal, Prateek
    Singh, Dinesh
    Goyal, Dinesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1041 - 1051
  • [40] Research on the Network Information Security Based on the Cloud Computing
    Shen, Wei
    2015 2nd International Conference on Education and Education Research (EER 2015), Pt 5, 2015, 9 : 349 - 353