Prominent Security Vulnerabilities in Cloud Computing

被引:0
|
作者
Alquwayzani, Alanoud [1 ]
Aldossri, Rawabi [1 ]
Frikha, Mounir [1 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun CCSIT, Al Hasa, Saudi Arabia
关键词
Cloud computing; vulnerabilities; cloud security; cloud misconfigurations; data loss; threats; PRIVACY; FOG;
D O I
10.14569/IJACSA.2024.0150281
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This research study examines the significant security vulnerabilities and threats in cloud computing, analyzes their potential consequences for enterprises, and proposes effective solutions for mitigating these vulnerabilities. This paper discusses the increasing significance of cloud security in a time characterized by rapid data expansion and technological progress. The paper examines prevalent vulnerabilities in cloud computing, including cloud misconfigurations, data leakage, shared technology threats, and insider threats. It emphasizes the necessity of adopting a proactive and comprehensive approach to ensure cloud security. The report places significant emphasis on the shared responsibility paradigm, adherence to industry laws, and the dynamic nature of cybersecurity threats. The situation necessitates the cooperation of researchers, cybersecurity professionals, and enterprises to proactively address these difficulties. This partnership aims to provide a thorough manual for organizations aiming to bolster their cloud security measures and safeguard valuable data in an ever-evolving digital landscape.
引用
收藏
页码:803 / 813
页数:11
相关论文
共 50 条
  • [31] Security Issues for Cloud Computing
    Hamlen, Kevin
    Kantarcioglu, Murat
    Khan, Latifur
    Thuraisingham, Bhavani
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 36 - 48
  • [32] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [33] Research On Cloud Computing And Security
    Yu, Ting-ting
    Zhu, Ying-Guo
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 314 - 316
  • [34] Cloud Computing and Security Measure
    Meetei, Mutum Zico
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 852 - 857
  • [35] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [36] Cloud Computing Security: A Survey
    Khalil, Issa M.
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTERS, 2014, 3 (01) : 1 - 35
  • [37] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [38] A Survey on the Security of Cloud Computing
    Alhenaki, Lubna
    Alwatban, Alaa
    Alamri, Bashaer
    Alarifi, Noof
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [39] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827