Cloud computing security: a taxonomy, threat detection and mitigation techniques

被引:1
|
作者
Rani P. [1 ]
Singh S. [1 ]
Singh K. [2 ]
机构
[1] Computer Science and Engineering Department, Deenbandhu Chhotu Ram University of Science and Technology, Sonipat
[2] Computer Engineering Department, Seth Jai Parkash Polytechnic, Yamuna Nagar
关键词
APIs; Cloud computing; DDoS; HDFS; mapreduce; security threats;
D O I
10.1080/1206212X.2024.2319937
中图分类号
学科分类号
摘要
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-based computing provides services like sharing resources e.g. network, storage, applications and software through the Internet. Cloud customers can access these services according to their need and pay only for those services which they utilize. Almost every industrial sector like banking, retail, education, healthcare, manufacturing and businesses is adopting cloud techniques within their enterprise either privately or in sharing with other enterprises. However, many security issues must be resolved because they are a barrier in adopting this fast-growing technology. This paper reviews various threats on cloud computing like distributed denial of service attack, spoofing attacks (e.g. ARP Spoofing, IP Spoofing, DNS Spoofing), man-in-the middle attack, data loss, data breach, reused IP address attack, malicious insiders, insecure interfaces & APIs etc. These security issues prevent users from adopting cloud services. This study presents various detection and prevention methods to address cloud security concerns. The effectiveness of each strategy is then analyzed based on its attributes, benefits and drawbacks. Deep learning and machine learning algorithms produce more precise findings for both known and unidentified attack patterns. © 2024 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:348 / 361
页数:13
相关论文
共 50 条
  • [1] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [2] Security threats and mitigation techniques affecting trust computation in cloud computing
    Saraf, Vinod
    Pachghare, Vinod
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1161 - 1172
  • [3] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517
  • [4] A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges
    Kene, Snehal G.
    Theng, Deepti P.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 227 - 232
  • [5] A Study on Security Mitigation Models in Cloud Computing
    Tanna, Maulik
    Sridaran, R.
    Dobariya, Ashwin
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 446 - 450
  • [6] Mitigation for cloud computing security risks and governance
    Jabez, J.
    Narmadha, R.
    Porkodi, S.
    Devi, L.
    International Journal of Cloud Computing, 2022, 11 (5-6) : 560 - 567
  • [7] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [8] Security Techniques for Cloud Computing Environment
    Garg, Prachi
    Goel, Sandeep
    Sharma, Avinash
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 771 - 776
  • [9] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537
  • [10] Establishment of the security risks taxonomy in cloud computing environment
    Grubor, Gojko
    Njeguš, Angelina
    Regodić, Dušan
    Metalurgia International, 2013, 18 (12): : 75 - 79