Cloud Security: Challenges and Future Scope
DOI:
https://doi.org/10.55524/ijirem.2023.10.3.8Keywords:
Cloud Computing, Cloud Security, Threats, Security issues, Data protection, AttacksAbstract
Now Cloud computing becomes so much popular coz satisfying business needs efficiently. Cloud features provide best lead to organizations to effectively access data and services with less cost over the internet. This also raise issues related with cloud security. This paper presents brief information regarding cloud computing security challenges. This information includes security mechanisms that should be consider for Cloud Service Models. This Work also focus on detail knowledge of security issues, threats which may use by attacker. It also explains cloud components levels threats and attack so more secure mechanism can identified for each component. This Paper introduced classification of Cloud security areas issues to develop secure Cloud Security services in future.
Downloads
References
Subramanian N, Jeyaraj A. (2018). Recent security challenges in cloud computing. Comput Electr Eng 71:28–42. Available: https://doi.org/10.1016/j.compeleceng.2018.06.006
Shi B, Cui L, Li B, Liu X, Hao Z, Shen H. (2018). Shadow monitor: an effective in-VM monitoring framework with hardware-enforced isolation. In: International Symposium on Research in Attacks, Intrusions, and Defenses. Springer, Berlin, pp 670–690. Available: https://doi.org/10.1007/978- 3-030-00470-5_31
Bhamare D, Samaka M, Erbad A, Jain R, Gupta L, Chan HA. (2017). Optimal virtual network function placement in multi cloud service function chaining architecture. Comput Commun 102:1–16. Available: https://doi.org/10.1016/j.comcom.2017.02.011
Deka GC, Das PK. (2018). Application of virtualization technology in IaaS cloud deployment model. In: Design and Use of Virtualization Technology in Cloud Computing: IGI
Global, pp 29–99. Available: 10.4018/978-1-5225-2785- 5.CH002
Oracle.com. (2018). The Oracle and KPMG Cloud Threat Report 2018 | Oracle (online). Available: https ://www.oracl e.com/cloud /cloud -threa t-repor t.html. Accessed 11 Dec 2018
Roman R, Lopez J, Mambo M. (2018). Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst. 78:680–698. Available: https://doi.org/10.1016/j.future.2016.11.009
Sgandurra D, Lupu E. (2016). Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput Surv. 48(3):1–38. Available: https://doi.org/10.1145/2856126
Kumar PR, Raj PH, Jelciana P. (2018). Exploring data security issues and solutions in cloud computing. Proc Comput Sci. 125:691–697. Available: https://doi.org/10.1016/j.procs.2017.12.089
Marwane Zekri, Said El Kafhali, Noureddine Aboutabit, and Youssef Saadi. (2017). DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments. 3rd International Conference of Cloud Computing Technologies and Applications. Available: 10.1109/CloudTech.2017.8284731
MGM Mehedi Hasan and Mohammad Ashiqur Rahman. (2017). Protection by Detection: A Signaling Game Approach to Mitigate Co-Resident Attacks in Cloud. IEEE 10th International Conference on Cloud Computing. Available: 10.1109/CLOUD.2017.76
Himadri Shekhar Mondal, Md. Tariq Hasan, Md. Bellal Hossain, Md. Ekhlasur Rahaman and Rabita Hasan, 2017. Enhancing Secure Cloud Computing Environment by Detecting DDoS Attack Using Fuzzy Logic. 3rd International Conference on Electrical Information and Communication Technology (EICT). Available: 10.1109/EICT.2017.8275211.
Mohit P, Biswas G. (2017). Confidentiality and storage of data in cloud environment. In: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Springer, Berlin. pp 289–295. Available: https://doi.org/10.1007/978-981-10- 3156-4_29
Somani G, Gaur MS, Sanghi D, Conti M, Buyya R. (2017). DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput Commun 107:30–48. Available: 10.1016/j.comcom.2017.03.010
Sehgal NK, Bhatt PCP. (2018). Cloud computing concepts and practics. Springer. Available: https://doi.org/10.1007/978-3-319-77839-6
Butun I, Erol-Kantarci M, Kantarci B, Song H. (2016). Cloud centric multi-level authentication as a service for secure public safety device networks. IEEE Commun Mag. 54(4):47–53. Available: 10.1109/MCOM.2016.7452265.
Zhang Y, Chen X, Li J, Wong DS, Li H, You I. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci. 379:42–61. Available: https://doi.org/10.1016/j.ins.2016.04.015
Mishra P, Pilli ES, Varadharajan V, Tupakula U. (2017). Intrusion detection techniques in cloud environment:a survey. J Netw Comput Appl. 77:18–47. Available: https://doi.org/10.1016/j.jnca.2016.10.015
Kohnfelder L, Garg P. (1999). The threats to our products. Microsoft Interface, Microsoft Corporation,New York. p 33. Available: Microsoft Defender for Endpoint News and Insights | Microsoft Security Blog
Tounsi W, Rais HJC. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput Secur. 72:212–233. Available: https://doi.org/10.1016/j.cose.2017.09.001
Meinig M, Sukmana MI, Torkura KA, Meinel CJPCS. (2019). Holistic strategy-based threat model for organizations. Proc Comput Sci. 151:100–107. Available: https://doi.org/10.1016/j.procs.2019.04.017
Mokhtar B, Azab MJAEJ. (2015). Survey on security issues in vehicular ad hoc networks. Alex Eng J.54(4):1115–1126. Available: https://doi.org/10.1016/j.aej.2015.07.011
Tan Y, Wu F, Wu Q, Liao XJTJOS. (2019). Resource stealing: a resource multiplexing method for
mix workloads in cloud system. J Supercomput. 75(1):33–49. Available: https://doi.org/10.1007/s11227-015-1609-3 [23] Hong JB, Nhlabatsi A, Kim DS, Hussein A, Fetais N, Khan KMJCN. (2019). Systematic identification of threats in the cloud: a survey. Comput Netw. 150:46–69. Available: [24] Rai S, Sharma K, Dhakal D. (2019). A survey on detection and mitigation of distributed denial-of service attack in named data networking. In: Sarma H, Borah S, Dutta N (eds) Advances in communication, cloud, and big data. Lecture notes in networks and systems, vol 31. Springer, Singapore. Available: http://dx.doi.org/10.1007/978-981-10-8911-4_18 [25] Eldewahi AE, Hassan A, Elbadawi K, Barry BI. (2018). The analysis of MATE attack in SDN based on STRIDE model. In: Proceedings of the International Conference on Emerging Internetworking, Data and Web Technologies, pp 901–910. Available: https://doi.org/10.1007/978-3-319-75928-9_83 [26] Alsmadi I. (2019). Incident response. In: The NICE Cyber Security Framework. pp 331–346. Available: https://doi.org/10.1007/978-3-030-02360-7_13
Wu M, Moon YB. (2017). Taxonomy of cross-domain attacks on cyber manufacturing system. Proc Comput Sci. 114:367– 374. Available: https://doi.org/10.1016/j.procs.2017.09.050
Murugan K, Suresh P. (2018). Efficient anomaly intrusion detection using hybrid probabilistic techniques in wireless ad hoc network. Int J Netw Secur. 20(4):730–737. Available: 10.6633/IJNS.201807 20(4).15
Ghose N, Lazos L, Li M. (2018). Secure device bootstrapping without secrets resistant to signal
manipulation attacks. In: Proceedings of the IEEE Symposium on Security and Privacy (SP). Pp 819–835. Available: 10.1109/SP.2018.00055
Zhang X, Zhang Y, Mo Q, Xia H, Yang Z, Yang M, Wang X, Lunand L, Duan H. (2018). An empirical study of web resource manipulation in real-world mobile applications. In: Proceedings of the 27th Security Symposium (Security 18). pp 1183–1198. Available: https://dl.acm.org/doi/10.5555/3277203.3277291
Coppolino L, D’Antonio S, Mazzeo G, Romano L. (2017). Cloud security: emerging threats and current solutions. Comput Electr Eng. 59:126–140. Available: https://doi.org/10.1016/j.compeleceng.2016.03.004