{"title":"Cloud Computing Security Challenges and Threats","authors":"Zina Balani, H. Varol","doi":"10.1109/ISDFS49300.2020.9116266","DOIUrl":null,"url":null,"abstract":"In today’s sophisticated life, technology covers all aspects of our daily life, and that creates an environment for the attackers to access and attack a targeted organisation easily with the lowest cost. However, it is difficult for the organisation to detect it easily. Cloud computing, users can store data across the network in an online environment. Moreover, the data can be accessed everywhere across the world. Most people, especially users who do not know enough about the increasing number of attacks and the development of technology, are concerned about keeping their data in clouds because security is a critical issue. In the study of this paper, some methods and techniques are provided to protect data in an online environment. These methods and techniques have the lowest costs and can be employed by every user as an easy way to defend themselves against attackers.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS49300.2020.9116266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In today’s sophisticated life, technology covers all aspects of our daily life, and that creates an environment for the attackers to access and attack a targeted organisation easily with the lowest cost. However, it is difficult for the organisation to detect it easily. Cloud computing, users can store data across the network in an online environment. Moreover, the data can be accessed everywhere across the world. Most people, especially users who do not know enough about the increasing number of attacks and the development of technology, are concerned about keeping their data in clouds because security is a critical issue. In the study of this paper, some methods and techniques are provided to protect data in an online environment. These methods and techniques have the lowest costs and can be employed by every user as an easy way to defend themselves against attackers.