Security Threats and Countermeasures in Cloud Computing (original) (raw)

Survey of Security Threats and Countermeasures in Cloud Computing

Cloud computing is one of the most trending IT domains in recent times. It allows a user to access state-of-theart resources, technology and infrastructure with just an internet connection. In the past few decades, most global organisations have begun to migrate towards cloud computing environments because of the plethora of advantages that are provided. Cloud computing technology is now growing at a rapid rate and it has become more convenient for organisations to transfer their workload onto the cloud. It calls for less investment and promises delivery of the latest technology at a high velocity. However, security has now become a common concern for the safety of a cloud computing environment. If the cloud environment is not built securely then it can face a lot of cyber threats which take advantage of the vulnerabilities in the system. This puts the assets, resources and the data belonging to a cloud environment at risk. This paper discusses in about the top cyber threats that a cloud computing environment faces. It also covers the countermeasures and the practices that a cloud provider should follow in order to ensure that the cloud environment is robust and impenetrable.

Security Issues and Countermeasures in Cloud Computing1 2

Cloud computing is gaining more and more attention towards IT companies, individual users and academia because of its ease of use and on-demand access to a shared pool of resources across the network. High profile companies like Amazon, Google and Microsoft have experienced security issues for couple of years back. Because of these security issues, some of IT companies are not willing to adopt this technology. To enable its adoption these existing issues have to be resolved. Though many more countermeasures have been proposed by the researchers for addressing the security issues, still scope exist to model highly secured system. This paper outlines security architecture, discusses security objectives, traditional and current security related issues and their countermeasures.

A Study on Security Threats in Cloud

Cloud computing is now invading almost all IT industry and has become a rich area of research. It enables the users to share the resources which are done through resource virtualization and they have to pay only for what they use. The new paradigm freed the organizations from the burden of installing and maintaining the expensive and critical software, platform and infrastructure. The only thing they need to see is the Internet enabled systems. As the number of dependents on the cloud services shoots up, the security issue has become an overwhelming problem for cloud service providers. In order to make use of the cloud benefits to full extent, these issues need to be addressed first. This paper presents the major security issues in cloud computing. Some of the countermeasures that can be implemented are also suggested.

Vulnerabilities and their countermeasures in Cloud Computing

Proceedings of the 11th INDIACom; INDIACom-2017; IEEE Conference ID: 40353 2017 4th International Conference on “Computing for Sustainable Global Development”, 01st - 03rd March, 2017, 2017

Cloud computing is mainly used in companies and organizations. The reason for its high demand in the market is primarily because it requires less planning, allowing people to start with minimum use of resources, but gradually increases with the increase of demand in services. However, there are many issues related to the security of data in Cloud computing. Data security and Privacy in data are the two main concern by the researchers and clients who want to opt for Cloud computing. Therefore, an attempt is made in this paper to analyze the security challenges in cloud computing that will further provide a better understanding on the various security issues and detection of those security issues. This paper also illustrates the countermeasures that have been adopted by the Cloud S ervice Industries.

Security Threats with Associated Mitigation Techniques in Cloud Computing

Cloud Computing emerges as one of the hottest topic in the field of information technology. Nowadays not just large organizations, but even small and medium size businesses are looking forward to adopt an economical computing resource for their business application, i.e. by introducing a new concept of cloud computing in their environment. Basically it's a new concept of providing virtualized resources to the consumers. Cloud Computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure.Consumers can request a cloud for services, applications, solutions and can store large amount of data from different location. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for ITbased solutions and services that theindustry uses. It promises to provide a flexible IT architecture; accessible through internet from lightweight portable devices.This would allow multi-fold increase in the capacity and capabilities of the existing and new software. This new economic model for computing has found fertile ground and is attracting massive global investment. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security in Cloud Computing is an importantand critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloudservice consumer should make sure that the cloud is safe enough from all the external threats so that thecustomer does not face any problem such as loss of data or data theft. There is also a possibility where amalicious user can penetrate the cloud by impersonating a legitimate user, thus infecting the entire cloud andaffects many customers who are sharing the infected cloud. This research paper outlines what cloud computing is, the various cloud models and the parameters that affect thesecurity of the cloud. This extensive research also aims to elaborate the possible security attacks and the security issues that arise in a cloud computing frame work. It focuses on technical security issues arising from the usage of cloud services and also provides an overview of key security issues related to cloud computing with the view of a secure cloud architecture environment.

A COMPREHENSIVE SURVEY ON SECURITY IN CLOUD COMPUTING

Dr.Anil Lamba, 2016

According to a Forbes' report published in 2015, cloud-based security spending is expected to increase by 42%. According to another research, the IT security expenditure had increased to 79.1% by 2015, showing an increase of more than 10% each year. International Data Corporation (IDC) in 2011 showed that 74.6% of enterprise customers ranked security as a major challenge. This paper summarizes a number of peer-reviewed articles on security threats in cloud computing and the preventive methods. The objective of our research is to understand the cloud components, security issues, and risks, along with emerging solutions that may potentially mitigate the vulnerabilities in the cloud. It is a commonly accepted fact that since 2008, cloud is a viable hosting platform; however, the perception with respect to security in the cloud is that it needs significant improvements to realise higher rates of adaption in the enterprise scale. As identified by another research, many of the issues confronting the cloud computing need to be resolved urgently. The industry has made significant advances in combatting threats to cloud computing, but there is more to be done to achieve a level of maturity that currently exists with traditional/on-premise hosting.

BOOK CHAPTER │ Cloud Computing Security A Review of Security Issues in Cloud Computing

Web of Deceit - June 2022 - Creative Research Publishers - Open Access, 2022

Cloud computing is one of the most popular terms in the computer industry right now. Virtualization enables resource sharing, which includes software, platform, and infrastructure. The underlying technology underpinning cloud resource sharing is virtualization. This environment aspires to be dynamic, dependable, and configurable, with a high level of service assurance. Security is just as important in the cloud as it is everywhere else. Various people have different perspectives on cloud computing. Some people feel that using the cloud is risky. Cloud providers go to great lengths to assure security. This study looks at a few important security vulnerabilities with cloud computing, as well as available remedies to those security issues in the cloud computing sector.

Security Attacks and Reduction of Risk Using Mitigation Techniques in Cloud Computing

Cloud computing is a hurriedly on the increase internet modern technology for facilitating with an assortment of services to its users. However, Along with rapid development and interesting proposals, there are many problems associated with this technology, which must be addressed with confidence, which represents the strongest barrier to its adoption. Computers play an important role in network attacks. Today, cloud services are also defunct. Attacks reduce the quality of services on computer networks and cloud platforms. Effective use of cloud computing in attacks that create services for needy users requires us to reduce vulnerability to attacks and improve security. This study addresses a variety of attacks that target cloud environments and potential mitigation techniques to mitigate attacks and relief from problems.

Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art

The ISC International Journal of Information Security, 2023

Cloud computing created a revolution in the way IT organizations and IT teams manage their internal digital resources and workloads. One major drawback or limitation of cloud computing, among others, is security. Cloud computing is plagued by a plethora of threats and vulnerabilities, with new ones being identified from time to time. Year by year, minor to significant security incidents are reported across the globe. To the best of my knowledge, no research artifact in the recent past covers the recent advancements in cloud computing security. To address this issue, this paper provides an analysis of the literature in the past few years related to cloud computing security. Taxonomy related to cloud computing threats and vulnerabilities is provided by extending threats proposed by Cloud Security Alliance, which can educate cloud users and guide cloud providers to strengthen or audit their security policies and practices. Finally, state-of-the-art countermeasures and a classification of solutions to safeguard the cloud against different threats are also provided. https://www.isecure-journal.com/article\_154670.html

A survey on top security threats in cloud computing

—Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.