scholarly journals Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework

2016 ◽  
Vol 94 ◽  
pp. 485-490 ◽  
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2018 ◽  
pp. 268-285 ◽  
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


2019 ◽  
Vol 8 (4) ◽  
pp. 424
Author(s):  
Dr. K.SAI MANOJ

Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.  


Author(s):  
Omar Adil Dheyab ◽  
Ahmed Ibrahim Turki ◽  
B. Rahmatullah B. Rahmatullah

Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere. In addition, many other features and services can be offered to customers. However, cloud computing still suffers many threats which may cause vulnerabilities. Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality. Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing. In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq. Consequently, many countermeasures are proposed. Descriptive research methodology is adopted in this research. The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.


Author(s):  
Dr. Satwinder Singh Rupra

Cloud computing can help organizations accomplish more by paying less and breaking the physical boundaries between IT infrastructure and its users, however heightened security threats must be overcome in order to benefit fully from this new computing exemplar. The objective of this research was to determine the fundamental cloud security challenges experienced by SMEs in Kenya. Descriptive survey was therefore chosen for this study because the researcher was interested in the opinions of the respondents in terms of security challenges in cloud computing. The primary area of study for this research was Nairobi, Kisumu and Mombasa and the target population for this study were the Top 100 SME companies in Kenya as of 2016. This information could be useful and vital to policy makers and researchers who are making efforts to improve security in the field of Cloud Computing.


Author(s):  
Darshan Bagrao

Abstract: The original aim of the research was to investigate the conceptual dimensions of cloud security threats and vulnerabilities. Cloud computing has changed the whole picture from centralized (client-server not web-based) to distributed systems and now we are getting back to virtual centralization (cloud computing). Although potential gain achieved from cloud computing but still model security is questionable. . The cloud computing concept offers dynamically scalable resources and so it uses internet as a communication media. This paper proposes survey on emerging threats of cloud and also discussed the existing threat report and their remediation. The result and analysis show that solution of this work will be helpful in summarizing the main security risks of cloud computing from different organizations. Keywords: Threat, vulnerabilities, model security.


2021 ◽  
Vol 14 (1) ◽  
pp. 11
Author(s):  
Yunusa Simpa Abdulsalam ◽  
Mustapha Hedabou

Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the present security flaws. The literature also provides an extensive review of security and privacy issues in cloud computing. Unfortunately, the works provided in the literature lack the flexibility in mitigating multiple threats without conflicting with cloud security objectives. The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. Conversely, studies that offer technical solutions to security threats have failed to explain how such security threats exist. This paper aims to introduce security and privacy issues that demand an adaptive solution approach without conflicting with existing or future cloud security. This paper reviews different works in the literature, taking into account its adaptiveness in mitigating against future reoccurring threats and showing how cloud security conflicts have invalidated their proposed models. The article further presents the security threats surrounding cloud computing from a user perspective using the STRIDE approach. Additionally, it provides an analysis of different inefficient solutions in the literature and offers recommendations in terms of implementing a secure, adaptive cloud environment.


Popular computing technologies like Distributed ,Parallel ,Grid etc., have already reached their peaks in providing services and now a hybrid aspect is capturing the focus which is a combination of traditional computing technology and network technology and termed to be “Cloud Computing ”.A desperate demand for data sharing and handling enterprise applications have called upon for cloud computing .A blocking wind for leveraging cloud computing technology is the aspect of security .But the passion towards adopting cloud have overridden the security threats. This paper glances over various security threats, risks, challenges along with their resistance capabilities to overcome the vulnerabilities in the cloud and also some of the encryption techniques that are used in the cloud.


Sign in / Sign up

Export Citation Format

Share Document