Prominent Security Vulnerabilities in Cloud Computing

被引:0
|
作者
Alquwayzani, Alanoud [1 ]
Aldossri, Rawabi [1 ]
Frikha, Mounir [1 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun CCSIT, Al Hasa, Saudi Arabia
关键词
Cloud computing; vulnerabilities; cloud security; cloud misconfigurations; data loss; threats; PRIVACY; FOG;
D O I
10.14569/IJACSA.2024.0150281
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This research study examines the significant security vulnerabilities and threats in cloud computing, analyzes their potential consequences for enterprises, and proposes effective solutions for mitigating these vulnerabilities. This paper discusses the increasing significance of cloud security in a time characterized by rapid data expansion and technological progress. The paper examines prevalent vulnerabilities in cloud computing, including cloud misconfigurations, data leakage, shared technology threats, and insider threats. It emphasizes the necessity of adopting a proactive and comprehensive approach to ensure cloud security. The report places significant emphasis on the shared responsibility paradigm, adherence to industry laws, and the dynamic nature of cybersecurity threats. The situation necessitates the cooperation of researchers, cybersecurity professionals, and enterprises to proactively address these difficulties. This partnership aims to provide a thorough manual for organizations aiming to bolster their cloud security measures and safeguard valuable data in an ever-evolving digital landscape.
引用
收藏
页码:803 / 813
页数:11
相关论文
共 50 条
  • [21] Scheduler vulnerabilities and coordinated attacks in cloud computing
    Zhou, Fangfei
    Goel, Manish
    Desnoyers, Peter
    Sundaram, Ravi
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (04) : 533 - 559
  • [22] Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing
    Zhou, Fangfei
    Goel, Manish
    Desnoyers, Peter
    Sundaram, Ravi
    2011 10TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2011,
  • [23] A REVIEW OF THREATS AND VULNERABILITIES TO CLOUD COMPUTING EXISTENCE
    Efozia, N. F.
    Ariwa, E.
    Asogwa, D. C.
    Awonusi, O.
    Anigbogu, S. O.
    2017 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH 2017), 2017, : 197 - 204
  • [24] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [25] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [26] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [27] A Smart Cloud Architecture to handle Security Issues and Vulnerabilities in Cloud
    Anitha, K. L.
    Nair, T. R. Gopalakrishnan
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 400 - 405
  • [28] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831
  • [29] Computing Security Scores for IoT Device Vulnerabilities
    Rizvi, Syed
    McIntyre, Nicholas
    Ryoo, Jungwoo
    2019 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2019), 2019, : 52 - 59
  • [30] The Security Risks of Cloud Computing
    Choi, Myeonggil
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 330 - 330