{"title":"Keynote speaker 3: Can the Cloud be secured…?","authors":"C. Shoniregun","doi":"10.1109/WorldCIS.2015.7359401","DOIUrl":null,"url":null,"abstract":"Summary form only given. The criminals continue to leverage new technologies for financial and non-financial benefits by avoiding detection and improving the effectiveness of their activities. The Cloud services infrastructures are actively being targeted because of the limitation in the fraud detection capabilities. Although, some Cloud providers strive to ensure security is well integrated into their service models, however, it is critical for consumers to understand the security implications associated with the usage, management, orchestration and monitoring of Cloud services. Reliance on a weak set of interfaces and APIs exposes organizations to a variety of security issues related to confidentiality, integrity, availability and accountability. However, this raises a plethora of questions concerning Cloud security.","PeriodicalId":392701,"journal":{"name":"International Conference on Information Society (i-Society 2013)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Society (i-Society 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WorldCIS.2015.7359401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Summary form only given. The criminals continue to leverage new technologies for financial and non-financial benefits by avoiding detection and improving the effectiveness of their activities. The Cloud services infrastructures are actively being targeted because of the limitation in the fraud detection capabilities. Although, some Cloud providers strive to ensure security is well integrated into their service models, however, it is critical for consumers to understand the security implications associated with the usage, management, orchestration and monitoring of Cloud services. Reliance on a weak set of interfaces and APIs exposes organizations to a variety of security issues related to confidentiality, integrity, availability and accountability. However, this raises a plethora of questions concerning Cloud security.