Fraud Threats Disclosure through Cloud Information Security Framework

被引:0
|
作者
Mavroeidakos, Theodoros [1 ]
Vergados, Dimitrios D. [2 ]
机构
[1] Natl Tech Univ Athens, Sch Elect & Comp Engn, Heroon Polytechniou 9, GR-15780 Zografos, Greece
[2] Univ Piraeus, Dept Informat, 80 Karaoli & Dimitriou St, GR-18534 Piraeus, Greece
关键词
CC paradigm; fraudulent activities; fraud threats; surface of cloud attacks; information security challenges;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Cloud Computing (CC) paradigm introduces a highly efficient environment based on the aggregation of novel technologies. The cloud-based services are characterized by enhanced behavior and unique features due to the capabilities facilitated by the particularities of the CC environment such as the scalability. However, because of these particularities, new threats and vectors of attacks emerge. This surface of cloud attacks, is distributed and covered in nature, which can be utilized to stage fraudulent activities. The cyber-incidents that entail fraudulent activities lead to negative effects such as the nefarious usage of CC resources and the abuse of the cloud-based services. To this end, the information security challenges, which are associated to fraud, lead to restrictions and barriers concerning the operational as well as the financial activities performed by the Cloud Service Provider (CSP). To counterbalance these security challenges, a Cloud Information Security (InfoSec) Framework should be incorporated in the operation of the CSPs' infrastructure. The proposed framework imposes the implementation of a series of phases oriented towards the entanglement with fraud threats so as to mitigate them and therefore secure the provision of the end-services, as well as protect the collected data.
引用
收藏
页码:328 / 333
页数:6
相关论文
共 50 条
  • [41] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [42] Cloud security: Emerging threats and current solutions
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 126 - 140
  • [43] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [44] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831
  • [45] Cloud Computing Threats and Provider Security Assessment
    Yu, Huiming
    Williams, Ken
    Yuan, Xiaohong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 238 - 250
  • [46] IT Security Threats in Cloud Computing Sourcing Model
    Rot, Artur
    Sobinska, Malgorzata
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
  • [47] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327
  • [48] Exploration of Various Cloud Security Challenges and Threats
    Chitturi, Arun Krishna
    Swarnalatha, Purushotham
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 891 - 899
  • [49] Information Disclosure and the Diffusion of Information Security Attacks
    Mitra, Sabyasachi
    Ransbotham, Sam
    INFORMATION SYSTEMS RESEARCH, 2015, 26 (03) : 565 - 584
  • [50] EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS
    Masrek, Mohamad Noorman
    Soesantari, Tri
    Khan, Asad
    Dermawan, Aang Kisnu
    INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY, 2020, 21 (03): : 1203 - 1214