Ransomware: The CryptoVirus Subverting Cloud Security

被引:0
|
作者
Bhattacharya, S. [1 ]
Kumar, C. R. S. [1 ]
机构
[1] DRDO, Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
cloud; vulnerabilities; security; threats; ransomware;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness of this platform interspersed with threats which can bring everything that subscribes to the cloud, to a halt raises questions. However advantages of cloud platforms far outweighs drawbacks and study of new challenges helps overcome drawbacks of this technology. One such emerging security threat is of ransomware attack on the cloud which threatens to hold systems and data on cloud network to ransom with widespread damaging implications. This provides huge scope for IT security specialists to sharpen their skillset to overcome this new challenge. This paper covers the broad cloud architecture, current inherent cloud threat mechanisms, ransomware vulnerabilities posed and suggested methods to mitigate it.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Dancing on a Volcano: Subverting Catastrophe in MP Shiel's The Purple Cloud
    Linthicum, Kent
    NINETEENTH-CENTURY CONTEXTS-AN INTERDISCIPLINARY JOURNAL, 2018, 40 (02): : 149 - 163
  • [22] Alternative Data Streams in NTFS - A Gateway for Subverting Endpoint Security Systems
    Stojanovski, Nenad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 71 - 75
  • [23] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [24] CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware
    Yun, Joobeom
    Hur, Junbeom
    Shin, Youngjoo
    Koo, Dongyoung
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (09): : 2228 - 2231
  • [25] Ransom Access Memories: Achieving Practical Ransomware Protection in Cloud with DeftPunk
    Wang, Zhongyu
    Song, Yaheng
    Xu, Erci
    Wu, Haonan
    Tong, Guangxun
    Sun, Shizhuo
    Li, Haoran
    Liu, Jincheng
    Ding, Lijun
    Liu, Rong
    Zhu, Jiaji
    Wu, Jiesheng
    PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 687 - 702
  • [26] Cloud Security Can the cloud be secured?
    Karnad, Kiran
    Nagenthram, Saravanan
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 208 - 210
  • [27] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [28] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [29] Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services
    Lee, Kyungroul
    Lee, Jaehyuk
    Lee, Sun-Young
    Yim, Kangbin
    SENSORS, 2023, 23 (06)
  • [30] Mitigating Ransomware Risks in Manufacturing and the Supply Chain: A Comprehensive Security Framework
    Aljoghaiman, Abdulaziz
    Sundram, Veera Pandiyan Kaliani
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2023, 17 (02): : 231 - 249