Ransomware: The CryptoVirus Subverting Cloud Security

被引:0
|
作者
Bhattacharya, S. [1 ]
Kumar, C. R. S. [1 ]
机构
[1] DRDO, Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
cloud; vulnerabilities; security; threats; ransomware;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness of this platform interspersed with threats which can bring everything that subscribes to the cloud, to a halt raises questions. However advantages of cloud platforms far outweighs drawbacks and study of new challenges helps overcome drawbacks of this technology. One such emerging security threat is of ransomware attack on the cloud which threatens to hold systems and data on cloud network to ransom with widespread damaging implications. This provides huge scope for IT security specialists to sharpen their skillset to overcome this new challenge. This paper covers the broad cloud architecture, current inherent cloud threat mechanisms, ransomware vulnerabilities posed and suggested methods to mitigate it.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Formal Modeling and Verification of Security Properties of a Ransomware-Resistant SSD
    Tripathy, Shivani
    Sahoo, Debiprasanna
    Satpathy, Manoranjan
    Mutyam, Madhu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (08) : 2766 - 2770
  • [32] Election Security in the Cloud: A CTF Activity to Teach Cloud and Web Security
    Romano, Zachary
    Windsor, Jennifer
    VanDerPol, Mathew
    Coffman, Joel
    2021 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2021), 2021,
  • [33] Cloud Security Certifications: A Comparison to Improve Cloud Service Provider Security
    Di Giulio, Carlo
    Sprabery, Read
    Kamhoua, Charles
    Kwiat, Kevin
    Campbell, Roy H.
    Bashir, Masooda N.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [34] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [35] Cloud Standards in Comparison Are New Security Frameworks Improving Cloud Security?
    Di Giulio, Carlo
    Kamhoua, Charles
    Campbell, Roy H.
    Sprabery, Read
    Kwiat, Kevin
    Bashir, Masooda N.
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 50 - 57
  • [36] A Conceptual Security Approach with Awareness Strategy and Implementation Policy to Eliminate Ransomware
    Han, Jordan W.
    Hoe, Ong J.
    Wing, Joseph S.
    Brohi, Sarfraz N.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (CSAI 2017), 2017, : 222 - 226
  • [37] Economics of Cloud Security
    Yang, Mingwen
    Jacob, Varghese
    Raghunathan, Srinivasan
    AMCIS 2015 PROCEEDINGS, 2015,
  • [38] Honeynets and Cloud Security
    Toth, Eric M.
    Chowdhury, Md Minhaz
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 270 - 275
  • [39] Security of Cloud Federation
    El Zant, Bassem
    El Zant, Nahla
    El Kadhi, Nabil
    Gagnaire, Maurice
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 335 - 339
  • [40] Security Evaluation in Cloud
    Mirkovic, Orlan
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1088 - 1093