scholarly journals A Survey of Emerging Threats in Cloud Security

Author(s):  
Darshan Bagrao

Abstract: The original aim of the research was to investigate the conceptual dimensions of cloud security threats and vulnerabilities. Cloud computing has changed the whole picture from centralized (client-server not web-based) to distributed systems and now we are getting back to virtual centralization (cloud computing). Although potential gain achieved from cloud computing but still model security is questionable. . The cloud computing concept offers dynamically scalable resources and so it uses internet as a communication media. This paper proposes survey on emerging threats of cloud and also discussed the existing threat report and their remediation. The result and analysis show that solution of this work will be helpful in summarizing the main security risks of cloud computing from different organizations. Keywords: Threat, vulnerabilities, model security.

Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Author(s):  
Alpana M. Desai ◽  
Kenrick Mock

Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of cloud computing. Enterprises that plan to utilize cloud services for their infrastructure, platform, and/or software needs must understand the security risks and privacy issues related to cloud computing. This chapter discusses the technical, legal, and policy/organizational security risks of cloud computing, and reviews recommendations/strategies for managing and mitigating security threats in cloud computing. It also presents vendor-specific solutions and strategies that cloud service providers are implementing for mitigating security risks in cloud computing.


Author(s):  
Ngoc Thuy Le ◽  
Doan B. Hoang

Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that materialises into an attack, forms an essential basis for a quantitative security metric. This paper proposes a novel approach to compute the probability distribution of cloud security threats based on a Markov chain and Common Vulnerability Scoring System. Moreover, the paper introduces the method to estimate the probability of security attacks. The use of the new security threat model and its computation is demonstrated through their application to estimating the probabilities of cloud threats and types of attacks.


2019 ◽  
Vol 8 (4) ◽  
pp. 424
Author(s):  
Dr. K.SAI MANOJ

Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.  


2011 ◽  
Vol 225-226 ◽  
pp. 706-709 ◽  
Author(s):  
Shu Guo Yang

Cloud computing is regarded as one of the most enticing technologies and potential silver bullet in the IT industry. Because of open condition and general-purpose nature of cloud, security issue is becoming a bottle neck of rapid development and broad application of cloud computing. Firstly, this paper addresses cloud customers’ significant concerns about and requirements of cloud security. Secondly, cloud security risks and threats posed by the pervasive and ad hoc nature of the cloud are comprehensively analyzed. Finally, some effective and dependable security mechanisms are proposed to lower cloud security risks and meet security requirements of cloud customers. Especially, a novel scheme for integrity and copyright protection of customers’ works in the cloud is presented based on digital watermarking and digital signature.


2019 ◽  
Vol 8 (2) ◽  
pp. 66-92 ◽  
Author(s):  
Akhilesh Mahesh ◽  
Niranjali Suresh ◽  
Manish Gupta ◽  
Raj Sharman

Cloud computing has been instrumental in transforming the way we store, access and process data. With mobility being the primary objective of the current market, cloud computing offers exactly that. Cloud offers convenient access to a shared pool of computing resources that can be configured and deployed with minimal effort which is used to deliver computing services over the internet. Exercising these advantages come with a plethora of security risks that need to be addressed. The security issues in cloud are complex due to the nature of implementation and regulations that govern them. In this article, we examine existing research on cloud risk and the various frameworks to manage risk. The objective is to map the risk with the audit control and technology that will help in mitigating the risk. We analysed the various cloud security solutions and came up with a list that best help in the effective management of the cloud risk and security issues.


Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


Author(s):  
Dr. Satwinder Singh Rupra

Cloud computing can help organizations accomplish more by paying less and breaking the physical boundaries between IT infrastructure and its users, however heightened security threats must be overcome in order to benefit fully from this new computing exemplar. The objective of this research was to determine the fundamental cloud security challenges experienced by SMEs in Kenya. Descriptive survey was therefore chosen for this study because the researcher was interested in the opinions of the respondents in terms of security challenges in cloud computing. The primary area of study for this research was Nairobi, Kisumu and Mombasa and the target population for this study were the Top 100 SME companies in Kenya as of 2016. This information could be useful and vital to policy makers and researchers who are making efforts to improve security in the field of Cloud Computing.


Author(s):  
Wajid Hassan ◽  
Te-Shun Chou ◽  
Xiaoming Li ◽  
Patrick Appiah-Kubi ◽  
Omar Tamer

The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented.  This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.


Sign in / Sign up

Export Citation Format

Share Document