Fraud Threats Disclosure through Cloud Information Security Framework

被引:0
|
作者
Mavroeidakos, Theodoros [1 ]
Vergados, Dimitrios D. [2 ]
机构
[1] Natl Tech Univ Athens, Sch Elect & Comp Engn, Heroon Polytechniou 9, GR-15780 Zografos, Greece
[2] Univ Piraeus, Dept Informat, 80 Karaoli & Dimitriou St, GR-18534 Piraeus, Greece
关键词
CC paradigm; fraudulent activities; fraud threats; surface of cloud attacks; information security challenges;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Cloud Computing (CC) paradigm introduces a highly efficient environment based on the aggregation of novel technologies. The cloud-based services are characterized by enhanced behavior and unique features due to the capabilities facilitated by the particularities of the CC environment such as the scalability. However, because of these particularities, new threats and vectors of attacks emerge. This surface of cloud attacks, is distributed and covered in nature, which can be utilized to stage fraudulent activities. The cyber-incidents that entail fraudulent activities lead to negative effects such as the nefarious usage of CC resources and the abuse of the cloud-based services. To this end, the information security challenges, which are associated to fraud, lead to restrictions and barriers concerning the operational as well as the financial activities performed by the Cloud Service Provider (CSP). To counterbalance these security challenges, a Cloud Information Security (InfoSec) Framework should be incorporated in the operation of the CSPs' infrastructure. The proposed framework imposes the implementation of a series of phases oriented towards the entanglement with fraud threats so as to mitigate them and therefore secure the provision of the end-services, as well as protect the collected data.
引用
收藏
页码:328 / 333
页数:6
相关论文
共 50 条
  • [31] Information Disclosure as a Means to Security
    Rabinovich, Zinovi
    Jiang, Albert Xin
    Jain, Manish
    Xu, Haifeng
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 645 - 653
  • [32] Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment
    Samy, Ganthan Narayana
    Albakri, Sameer Hasan
    Maarop, Nurazean
    Magalingam, Pritheega
    Wong, Doris Hooi-Ten
    Shanmugam, Bharanidharan
    Perumal, Sundresan
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 566 - 578
  • [33] Cloud Security Engineering: Avoiding Security Threats the Right Way
    Aljawarneh, Shadi
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (02) : 64 - 70
  • [34] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [35] A Classification and Characterization of Security Threats in Cloud Computing
    Islam, Tariqul
    Manivannan, D.
    Zeadally, Sherali
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 1 - 17
  • [36] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111
  • [37] A survey on top security threats in cloud computing
    Kazim, Muhammad
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (03) : 109 - 113
  • [38] Security Threats/Attacks Present in Cloud Environment
    Munir, Kashif
    Palaniappan, Sellapan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 107 - 114
  • [39] Cloud of Things (CoTs): Security Threats and Attacks
    Almtrafi, Sara Mutlaq
    Alkhudadi, Bdour Abduallatif
    Alsuwat, Hatim
    Alsuwat, Emad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (08): : 229 - 237
  • [40] Various Security Threats and Their Solutions In Cloud Computing
    Barnwal, Anil
    Pugla, Satyakam
    Jangade, Rajesh
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 758 - 764