Explore chapters and articles related to this topic
Cloud computing security challenges and their solutions
Published in Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba, Security and Privacy Trends in Cloud Computing and Big Data, 2022
Rimsha Khalid, Khowla Khaliq, Muhammad Imran Tariq, Shahzadi Tayyaba, Muhammad Arfan Jaffar, Muhammad Arif
Cloud security is used to secure cloud computing systems with security policies, restrictions, and technology. It is important to secure the internal data or information of any organization that can affect its integrity and reputation. Some of the major challenges faced by the user regarding cloud security includes lack of control (maintenance of a software day to day results in having less visibility and control), cloud platforms may not comply with organization regulations (require to meet some regulatory such as HIPPA, FISMA, DSS, or PCI), data privacy issues (organization may face financial issues due to leaked data), aware users affected by data breaches (by notifying customers), user access control (users’ responsibility to check the user access control come along with cloud service providers such as IaaS, PaaS, or SaaS), Vendor Lock (Security feature), and lack of personnel experienced in cloud security measures (managed security service providers tool put a team of security experts). These challenges will result in major losses in terms of computer hacking, consumer protection, and identity integrity. When we speak about some infrastructure built on an open network, i.e., the Internet, security is still the main component. The same also refers to cloud computing since it is also Internet-based. Hence, it is necessary to run a cloud security risk assessment. This risk assessment involves the identification of the biggest risks and their impacts [4].
Cloud Security
Published in Sunilkumar Manvi, Gopal K. Shyam, Cloud Computing, 2021
Sunilkumar Manvi, Gopal K. Shyam
Cloud computing security or, in other words, Cloud security alludes to a wide arrangement of approaches, advances and controls conveyed to ensure information, applications and the related framework of Cloud computing. It is a sub-domain of computer security, network security, and, all the more extensively, data security. Cloud computing storage capability provides clients with abilities to store and procedure their information in data centers. Organizations utilize the Cloud in a wide range of service models (for example, SaaS, PaaS and IaaS) and deployment models (private, hybrid, public and community).
An Extensive Exploration of Privacy and Compliance Considerations for Hybrid Cloud Deployments
Published in T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy, Privacy and Security Challenges in Cloud Computing, 2022
P. Hemalatha, W.T. Chembian, A. Ranjith Kumar, S. Ramesh, B. Jegajothi
Cloud security threats mainly consist of the following:Breaching of data: This has impact on the data privacy and organization. Data should be safe from unauthorized users.Loss of data: This may take place due to failure of hardware or attacks in the system. To intervene in such scenarios, data backup must be applied.Hijacking accounts/service traffics: The user’s integrity is altered. Private information of the user may be at risk.Insecure interfaces and APIs: Interfaces and APIs are used for communication between users and providers. APIs must be capable of encrypting and transferring data through interfaces.Denial of service: Interruption by an unauthorized user can cause alteration in the encryption key, thus lowering the system speed. In order to mitigate such attacks, it’s the responsibility of both the user and the cloud to develop an algorithm to prevent such malicious activities.Malicious insider personnel: These are employees working within the organization. Depending upon the organizational policies, legal action against such employees may be taken.Misusing cloud services: Misusing cloud features such as multi-tenancy to have an access to data of other organizations. Measures can be taken by cloud to prevent such activities.Lack of diligence: Organizations all over the world prefer using cloud services; however, they are not completely aware of its threats. Hence, awareness programs must be conducted to educate all the fields of cloud services.Sharing technological vulnerabilities: Cloud shares their resources in a scalable manner which is ideal and hence should be practiced in all domains including monitoring systems.
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Published in Cybernetics and Systems, 2023
Ozgu Can, Fursan Thabit, Asia Othman Aljahdali, Sharaf Al-Homdy, Hoda A. Alkhzaimi
Cloud security, often referred to as cloud computing security, is a set of rules, controls, processes, and technologies that work together to safeguard cloud-based systems, data, and infrastructure. These security approaches may secure cloud data, ensure legal compliance, secure consumer privacy, and establish authentication criteria for specific people and devices. From access authentication to traffic filtering, cloud security may be tailored to a company’s requirements. ElasticaQ2 2015 and CSA work further toward developing a feasible cloud application security engineering that provides control and mitigation. Also, the International Organization for Standardization (ISO) defines data security concerns that may be addressed in cloud computing as fundamental security criteria for a successful and secure advanced technological solution (Cloud Security Alliance 2013, 2010). The research briefly discusses the critical security of cloud computing in this field, as shown in Figure 3.
Securing personal data in public cloud
Published in Journal of Information and Telecommunication, 2020
Péter Vörös, Dániel Csubák, Péter Hudoba, Attila Kiss
Accessing the clouds In the clouds there cannot be any unencrypted user data, to make sure that it is uncompromisable by the provider or any third person. Data breach is considered to be the number one threat in the latest (2016) list provided by Cloud Security Alliance (The Treacherous Twelve Cloud – Computing Top Threats in 2016, 2016).