{"title":"基于用户视角的云平台威胁与漏洞分析","authors":"S. Kaur, Gaganpreet Kaur","doi":"10.1109/INDIACom51348.2021.00095","DOIUrl":null,"url":null,"abstract":"Cloud technology is a shared pool of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort over the internet. It has enormous advantages but also has many security risks. Cloud users require understanding emerging threats, vulnerabilities, and plan possible countermeasures before transferring their computing, storage, and application to remote locations. Due to its rising threats, identification of the vulnerabilities and most appropriate solution directives to strengthen security in the cloud environment becomes paramount for all operations in it. In our study, we have scrutinized the threats along with vulnerable area and classified them based on three domains from the perspective of users. To mitigate the threats, possible existing countermeasures are listed against each threat in this paper.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Threat and Vulnerability Analysis of Cloud Platform: A User Perspective\",\"authors\":\"S. Kaur, Gaganpreet Kaur\",\"doi\":\"10.1109/INDIACom51348.2021.00095\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud technology is a shared pool of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort over the internet. It has enormous advantages but also has many security risks. Cloud users require understanding emerging threats, vulnerabilities, and plan possible countermeasures before transferring their computing, storage, and application to remote locations. Due to its rising threats, identification of the vulnerabilities and most appropriate solution directives to strengthen security in the cloud environment becomes paramount for all operations in it. In our study, we have scrutinized the threats along with vulnerable area and classified them based on three domains from the perspective of users. To mitigate the threats, possible existing countermeasures are listed against each threat in this paper.\",\"PeriodicalId\":415594,\"journal\":{\"name\":\"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)\",\"volume\":\"72 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDIACom51348.2021.00095\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACom51348.2021.00095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Threat and Vulnerability Analysis of Cloud Platform: A User Perspective
Cloud technology is a shared pool of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort over the internet. It has enormous advantages but also has many security risks. Cloud users require understanding emerging threats, vulnerabilities, and plan possible countermeasures before transferring their computing, storage, and application to remote locations. Due to its rising threats, identification of the vulnerabilities and most appropriate solution directives to strengthen security in the cloud environment becomes paramount for all operations in it. In our study, we have scrutinized the threats along with vulnerable area and classified them based on three domains from the perspective of users. To mitigate the threats, possible existing countermeasures are listed against each threat in this paper.