Ransomware: The CryptoVirus Subverting Cloud Security

被引:0
|
作者
Bhattacharya, S. [1 ]
Kumar, C. R. S. [1 ]
机构
[1] DRDO, Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
cloud; vulnerabilities; security; threats; ransomware;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness of this platform interspersed with threats which can bring everything that subscribes to the cloud, to a halt raises questions. However advantages of cloud platforms far outweighs drawbacks and study of new challenges helps overcome drawbacks of this technology. One such emerging security threat is of ransomware attack on the cloud which threatens to hold systems and data on cloud network to ransom with widespread damaging implications. This provides huge scope for IT security specialists to sharpen their skillset to overcome this new challenge. This paper covers the broad cloud architecture, current inherent cloud threat mechanisms, ransomware vulnerabilities posed and suggested methods to mitigate it.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] From Threats Subverting Cloud Security to a Secure Trust Paradigm
    Bhattacharya, S.
    Kumar, C. R. S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 510 - 515
  • [2] Cloud databases: a breeding ground for ransomware
    Sood A.K.
    Wiley M.
    Network Security, 2023, 2023 (01)
  • [3] Security Assurance Against Cybercrime Ransomware
    Rehman, Habib Ur
    Yafi, Eiad
    Nazir, Mohammed
    Mustafa, Khurram
    INTELLIGENT COMPUTING & OPTIMIZATION, 2019, 866 : 21 - 34
  • [4] Ransomware - WannaCry Security is everyone's
    Chuquilla, Alejandro
    Guarda, Teresa
    Ninahualpa Quina, Geovanni
    2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,
  • [5] Ransomware Attacks: Radical Menace for Cloud Computing
    Sajjan, Rajani S.
    Ghorpade, Vijay R.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1640 - 1646
  • [6] RansomWare and Internet of Things: A New Security Nightmare
    Zahra, Syed Rameem
    Chishti, Mohammad Ahsan
    2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 551 - 555
  • [7] Large Scale Ransomware Detection by Cognitive Security
    Herrera Silva, Juan A.
    Hernandez-Alvarez, Myriam
    2017 IEEE SECOND ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2017,
  • [8] Ransomware Security Threat Modeling for Photovoltaic Systems
    Su, Ying
    Ahn, Bohyun
    Alvee, Syed R. B.
    Kim, Taesic
    Choi, Jinchun
    Smith, Scott C.
    2021 6TH IEEE WORKSHOP ON THE ELECTRONIC GRID (EGRID), 2021,
  • [9] Facing ransomware: an approach with private cloud and sentinel software
    Martínez-García H.A.
    Computer Fraud and Security, 2020, 2020 (08): : 16 - 19
  • [10] The rise of ransomware and emerging security challenges in the Internet of Things
    Yaqoob, Ibrar
    Ahmed, Ejaz
    Rehman, Muhammad Habib Ur
    Ahmed, Abdelmuttlib Ibrahim Abdalla
    Al-garadi, Mohammed Ali
    Imran, Muhammad
    Guizani, Mohsen
    COMPUTER NETWORKS, 2017, 129 : 444 - 458