2021
DOI: 10.1007/s42979-021-00732-3
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Security Challenges and Related Defensive Measures: A Survey and Taxonomy

Abstract: Existing classification systems of cloud computing security challenges have mostly excluded human error as a major root cause of cloud security issues. Therefore, we propose a new cloud security challenge classification system by adding Human Error as a category and retaining the most relevant categories-Network, Data Access, and Virtualization-from previous research. Through a literature survey, we identified effective defensive measures that are used by experts to combat these security challenges and we prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 27 publications
(58 reference statements)
0
1
0
Order By: Relevance
“…One of the primary reasons for conducting this research is to enhance user awareness and reduce human error. Human errors are among the most common reasons for security breaches in cloud-based environments [24]. Cloud computing is enriched with technical measures but may include issues like weak passwords, misconfigurations, and the leakage of sensitive information.…”
Section: Lack Of User Awareness and Human Errormentioning
confidence: 99%
“…One of the primary reasons for conducting this research is to enhance user awareness and reduce human error. Human errors are among the most common reasons for security breaches in cloud-based environments [24]. Cloud computing is enriched with technical measures but may include issues like weak passwords, misconfigurations, and the leakage of sensitive information.…”
Section: Lack Of User Awareness and Human Errormentioning
confidence: 99%
“…While CSPs provide considerable convenience to users and corporations, they also pose potential threats to data storage security, resulting in some unavoidable security problems, such as network attacks, hardware failures, management errors, etc. [3]. When data owners (DOs) outsource data to the CSP, this also means that they lose physical control power over the data [4].…”
Section: Introductionmentioning
confidence: 99%