解决数据泄露问题的云计算安全挑战与威胁分析

M. Kaur, A. Kaimal
{"title":"解决数据泄露问题的云计算安全挑战与威胁分析","authors":"M. Kaur, A. Kaimal","doi":"10.1109/ICCCI56745.2023.10128329","DOIUrl":null,"url":null,"abstract":"Technology now affects every element of the high-tech society, which creates an environment that permits attackers to gain access easily, cheaply and attack a particular organization. The organization struggles to quickly notice it, though. With cloud computing, users can save data online and over a network. Additionally, the data is accessible from anywhere in the world. IT-related capabilities can be accessed by multiple users as a service through internet because of cloud computing, and these services are charged as per use. A substantial rise in the use of various cloud services has occurred based on the adoption of cloud technology by several cloud computing providers, including Microsoft, Google, IBM, Yahoo and Amazon. The Amazon is ruling the market due to its architectural characteristics. Different paid tools and open-source tools are being developed to meet the requirements. Since security is a crucial matter, most individuals are apprehensive about storing their pivotal information in a cloud, especially those who are unaware about the rise in attacks and the advancement of technology. There have been numerous advancements made when it comes to cloud computing, many challenges still need to be resolved, including those relating to security, interoperability, resource scheduling, virtualization, etc.This paper carries out a systematic literature review by detecting cloud computing safety challenges and threats, also offers ideas for resolving data breach issues.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":" 24","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis of Cloud Computing Security Challenges and Threats for Resolving Data Breach Issues\",\"authors\":\"M. Kaur, A. Kaimal\",\"doi\":\"10.1109/ICCCI56745.2023.10128329\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technology now affects every element of the high-tech society, which creates an environment that permits attackers to gain access easily, cheaply and attack a particular organization. The organization struggles to quickly notice it, though. With cloud computing, users can save data online and over a network. Additionally, the data is accessible from anywhere in the world. IT-related capabilities can be accessed by multiple users as a service through internet because of cloud computing, and these services are charged as per use. A substantial rise in the use of various cloud services has occurred based on the adoption of cloud technology by several cloud computing providers, including Microsoft, Google, IBM, Yahoo and Amazon. The Amazon is ruling the market due to its architectural characteristics. Different paid tools and open-source tools are being developed to meet the requirements. Since security is a crucial matter, most individuals are apprehensive about storing their pivotal information in a cloud, especially those who are unaware about the rise in attacks and the advancement of technology. There have been numerous advancements made when it comes to cloud computing, many challenges still need to be resolved, including those relating to security, interoperability, resource scheduling, virtualization, etc.This paper carries out a systematic literature review by detecting cloud computing safety challenges and threats, also offers ideas for resolving data breach issues.\",\"PeriodicalId\":205683,\"journal\":{\"name\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\" 24\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI56745.2023.10128329\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

技术现在影响着高科技社会的每一个元素,这创造了一个允许攻击者轻松、廉价地进入并攻击特定组织的环境。不过,公司很难迅速注意到这一点。有了云计算,用户可以在线或通过网络保存数据。此外,数据可以从世界任何地方访问。由于云计算,与it相关的功能可以由多个用户通过互联网作为服务访问,并且这些服务按使用收费。由于包括微软、bb0、IBM、雅虎和亚马逊在内的几家云计算提供商采用了云技术,各种云服务的使用量大幅增加。亚马逊因其建筑特点而统治着市场。正在开发不同的付费工具和开源工具来满足需求。由于安全是一个至关重要的问题,大多数人都担心将他们的关键信息存储在云中,特别是那些不知道攻击的增加和技术进步的人。在云计算方面已经取得了许多进步,但仍有许多挑战需要解决,包括与安全性、互操作性、资源调度、虚拟化等相关的挑战。本文通过检测云计算安全挑战和威胁进行了系统的文献综述,并为解决数据泄露问题提供了思路。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of Cloud Computing Security Challenges and Threats for Resolving Data Breach Issues
Technology now affects every element of the high-tech society, which creates an environment that permits attackers to gain access easily, cheaply and attack a particular organization. The organization struggles to quickly notice it, though. With cloud computing, users can save data online and over a network. Additionally, the data is accessible from anywhere in the world. IT-related capabilities can be accessed by multiple users as a service through internet because of cloud computing, and these services are charged as per use. A substantial rise in the use of various cloud services has occurred based on the adoption of cloud technology by several cloud computing providers, including Microsoft, Google, IBM, Yahoo and Amazon. The Amazon is ruling the market due to its architectural characteristics. Different paid tools and open-source tools are being developed to meet the requirements. Since security is a crucial matter, most individuals are apprehensive about storing their pivotal information in a cloud, especially those who are unaware about the rise in attacks and the advancement of technology. There have been numerous advancements made when it comes to cloud computing, many challenges still need to be resolved, including those relating to security, interoperability, resource scheduling, virtualization, etc.This paper carries out a systematic literature review by detecting cloud computing safety challenges and threats, also offers ideas for resolving data breach issues.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信