{"title":"云计算环境下的安全攻击防范","authors":"Kashish Gaur, Kaamya Gaur, M. Diwakar, Prabhishek Singh, Neeraj Kumar Pandey","doi":"10.1109/ISCON57294.2023.10112020","DOIUrl":null,"url":null,"abstract":"With rising popularity of social platforms like Google, Amazon, Microsoft, etc., there have been several incidents of cloud cyber-attacks that have been reported in the past few years. End-to-end security have become one of the biggest challenges in the field of cloud computing in recent days. Although there have been several claimed advantages that come from cloud computing models, what needs to be noticed is the loss of control in security over the cloud-based assets [9]. In this paper, we have analyzed the models to deal with cloud-related attacks and with the ways of improving cloud security. We have studied and analyzed each one of the proposals and have finalized one of them as the one model, that is comparatively better than the rest.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Prevention of Security Attacks in Cloud Computing\",\"authors\":\"Kashish Gaur, Kaamya Gaur, M. Diwakar, Prabhishek Singh, Neeraj Kumar Pandey\",\"doi\":\"10.1109/ISCON57294.2023.10112020\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With rising popularity of social platforms like Google, Amazon, Microsoft, etc., there have been several incidents of cloud cyber-attacks that have been reported in the past few years. End-to-end security have become one of the biggest challenges in the field of cloud computing in recent days. Although there have been several claimed advantages that come from cloud computing models, what needs to be noticed is the loss of control in security over the cloud-based assets [9]. In this paper, we have analyzed the models to deal with cloud-related attacks and with the ways of improving cloud security. We have studied and analyzed each one of the proposals and have finalized one of them as the one model, that is comparatively better than the rest.\",\"PeriodicalId\":280183,\"journal\":{\"name\":\"2023 6th International Conference on Information Systems and Computer Networks (ISCON)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 6th International Conference on Information Systems and Computer Networks (ISCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCON57294.2023.10112020\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCON57294.2023.10112020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With rising popularity of social platforms like Google, Amazon, Microsoft, etc., there have been several incidents of cloud cyber-attacks that have been reported in the past few years. End-to-end security have become one of the biggest challenges in the field of cloud computing in recent days. Although there have been several claimed advantages that come from cloud computing models, what needs to be noticed is the loss of control in security over the cloud-based assets [9]. In this paper, we have analyzed the models to deal with cloud-related attacks and with the ways of improving cloud security. We have studied and analyzed each one of the proposals and have finalized one of them as the one model, that is comparatively better than the rest.