Prominent Security Vulnerabilities in Cloud Computing

被引:0
|
作者
Alquwayzani, Alanoud [1 ]
Aldossri, Rawabi [1 ]
Frikha, Mounir [1 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun CCSIT, Al Hasa, Saudi Arabia
关键词
Cloud computing; vulnerabilities; cloud security; cloud misconfigurations; data loss; threats; PRIVACY; FOG;
D O I
10.14569/IJACSA.2024.0150281
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This research study examines the significant security vulnerabilities and threats in cloud computing, analyzes their potential consequences for enterprises, and proposes effective solutions for mitigating these vulnerabilities. This paper discusses the increasing significance of cloud security in a time characterized by rapid data expansion and technological progress. The paper examines prevalent vulnerabilities in cloud computing, including cloud misconfigurations, data leakage, shared technology threats, and insider threats. It emphasizes the necessity of adopting a proactive and comprehensive approach to ensure cloud security. The report places significant emphasis on the shared responsibility paradigm, adherence to industry laws, and the dynamic nature of cybersecurity threats. The situation necessitates the cooperation of researchers, cybersecurity professionals, and enterprises to proactively address these difficulties. This partnership aims to provide a thorough manual for organizations aiming to bolster their cloud security measures and safeguard valuable data in an ever-evolving digital landscape.
引用
收藏
页码:803 / 813
页数:11
相关论文
共 50 条
  • [41] Performance and security in cloud computing
    Weizhong Qiang
    The Journal of Supercomputing, 2019, 75 : 1 - 3
  • [42] Performance and security in cloud computing
    Qiang, Weizhong
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 1 - 3
  • [43] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [44] Security Concerns in Cloud Computing
    Kaur, Puneet Jai
    Kaushal, Sakshi
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 103 - 112
  • [45] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [46] CLOUD COMPUTING SECURITY ISSUES
    Solanki, Shubhankar
    Khan, Wasim
    Arora, Harshit
    Jain, Anupriya
    IIOAB JOURNAL, 2019, 10 (02) : 43 - 48
  • [47] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [48] Security Concerns in Cloud Computing
    Khalil, Issa M.
    Khreishah, Abdallah
    Bouktif, Salah
    Ahmad, Azeem
    PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 411 - 416
  • [49] Analysis on the Security of Cloud Computing
    He Zhonglin
    He Yuhua
    PIAGENG 2010: PHOTONICS AND IMAGING FOR AGRICULTURAL ENGINEERING, 2010, 7752
  • [50] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245