基于OWASP的云计算安全

AbdulAzeez R. Alobaidi, Zinah N. Nuimi
{"title":"基于OWASP的云计算安全","authors":"AbdulAzeez R. Alobaidi, Zinah N. Nuimi","doi":"10.1109/icci54321.2022.9756064","DOIUrl":null,"url":null,"abstract":"In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cloud computing security based on OWASP\",\"authors\":\"AbdulAzeez R. Alobaidi, Zinah N. Nuimi\",\"doi\":\"10.1109/icci54321.2022.9756064\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.\",\"PeriodicalId\":122550,\"journal\":{\"name\":\"2022 5th International Conference on Computing and Informatics (ICCI)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Computing and Informatics (ICCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icci54321.2022.9756064\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Computing and Informatics (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icci54321.2022.9756064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

近年来,由于经济和效率等原因,云计算的使用得到了发展。云计算面临的主要问题是安全性以及如何确保文件得到保护。云计算中的漏洞被认为是最终用户面临的一个尚未填补的巨大挑战。本文的主要目标是通过基于操作、开发经验和安全社区控制威胁和攻击,使人们能够保护他们在云上运行的服务和产品。在本文中,我们提出了一个基于与跟踪任务、想法和问题相关的安全问题的新模型,该模型可以以各种形式实现,例如在软件开发生命周期(SDLC)中使用威胁,并使用控制故事来确保已识别的威胁得到缓解。为了评估所建议模型的性能,我们使用了执行时间。对于我们的测试,我们使用一个654字节的文件进行加密和解密。结果表明,该模型对小文件的加密是有效的。此外,该模型的解密速度比传统模型快得多。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cloud computing security based on OWASP
In recent years, the use of cloud computing is grown up due to several reasons such as economic and efficiency. The major issue faced in cloud computing is security and how to ensure files protection. The vulnerabilities in cloud computing are considered a big challenge for the end-users that are not filled yet. The main objective of this paper is to enable people to protect their services and products running on clouds by controlling threats and attacks based on the operations, experience of development, and security communities. We proposed in this paper a new model based on the security issues related to tracking tasks, ideas, and problems which can implement in various forms such as using the threats in Software Development Life Cycle (SDLC) and using control stories to make sure the identified threats are mitigated. To evaluate the performance of the proposed model, we used the execution time. For our test, we used a 654 byte file for encryption and decryption. The obtained results indicate that our model is efficient especially for the small files in encryption. Moreover, the proposed model was decrypting the file much faster than the traditional model.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信