The Layers of Cloud Computing Infrastructure and Security Attacking Issues

被引:0
|
作者
Zawaideh, Firas Hanna [1 ]
Ghanem, Waheed Ali H. M. [2 ]
Yusoff, M. Hafiz [3 ]
Saany, Syarilla Iryani A. [4 ]
Jusoh, Julaily Aida [4 ]
El-Ebiary, Yousef A. Baker [4 ]
机构
[1] Irbid Natl Univ, Fac Sci & Informat Technol, Cyber Secur Dept, Irbid, Jordan
[2] Univ Aden, Fac Engn, Aden, Yemen
[3] UniSZA, Student Affairs, Kuala Terengganu, Malaysia
[4] UniSZA, Fac Informat & Comp, Kuala Terengganu, Malaysia
关键词
Cloud Computing; Availability; Auditability; Trust; Access management;
D O I
10.47750/pnr.2022.13.S05.124
中图分类号
R9 [药学];
学科分类号
1007 ;
摘要
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Cloud computing is not a computer network only it's about hosting and services that are provided, run, and maintain over that network. Application or documentation is hosted on a single company server and accessed via the company network with network computing. Cloud computing is bigger than that it Includes multiple companies, multiple servers, as well as multiple networks. In this paper, we mainly discuss three main issues of cloud computing issues in the cloud, Attacks on cloud infrastructure, and security at different layers in the cloud. The main objectives of this research are to identify the meaning of cloud computing, get knowledge about the history of cloud computing, identify issues in cloud computing, identify challenges in cloud computing, and identify solutions for the issues in cloud computing. The research also touches on the cloud services are now an integral part of corporate life, bringing with them the opportunity to accelerate business with their fast-tracking capabilities, allowing us to accelerate our resources, and provide new opportunities for collaboration. The world today is becoming increasingly cloudy, and the effects of businesses and consumers alike are far-reaching. Cloud Computing brings many benefits to its users such as reduced costs, easy shipping, scale as you want, etc.
引用
收藏
页码:792 / 800
页数:9
相关论文
共 50 条
  • [21] Cloud Computing: Legal and Security Issues
    Hourani, Hussam
    Abdallah, Mohammad
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2018, : 13 - 16
  • [22] Research on the Security Issues of Cloud Computing
    Jia Weihua
    Sun Shibing
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 845 - 848
  • [23] An Analysis of Cloud Computing Security Issues
    Behl, Akhil
    Behl, Kanika
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 109 - 114
  • [24] On Technical Security Issues in Cloud Computing
    Jensen, Meiko
    Schwenk, Joerg
    Gruschka, Nils
    Lo Iacono, Luigi
    CLOUD: 2009 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2009, : 109 - +
  • [25] Security and privacy issues in cloud computing
    Abbas, Haider
    Maennel, Olaf
    Assar, Said
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 233 - 235
  • [26] Security and Privacy Issues in Cloud Computing
    UbaidullahBokhari, Mohammad
    MakkiShallal, Qahtan
    Tamandani, Yahya Kord
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 896 - 900
  • [27] Security Issues in Cloud Computing: A Perspective
    Aljawarneh, Shadi
    Maatuk, Abdelsalam M.
    Ali, Akhtar
    ICECCO'12: 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION, 2012, : 242 - 246
  • [28] The technical security issues in cloud computing
    Shi, Jun
    Li, Hui
    Zhou, Lidong
    International Journal of Information and Communication Technology, 2013, 5 (3-4) : 272 - 282
  • [29] Safeguarding Cloud Computing Infrastructure: A Security Analysis
    Alenezi, Mamdouh
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 159 - 167
  • [30] A Layered Security Approach for Cloud Computing Infrastructure
    Yildiz, Mehmet
    Abawajy, Jemal
    Ercan, Tuncay
    Bernoth, Andrew
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 763 - +