2019
DOI: 10.12785/ijcds/080103
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges from Abuse of Cloud Service Threat

Abstract: Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and risks. The paper provides a useful introduction to the rising security issues of Abuse of cloud service threat, which has no standard security measures to mitigate its risks and vulnerabilities. The threat can result an unbearable system gridlock and can make cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…The detection and handling of these threats is made difficult by the malicious threats' execution, which also raises the likelihood that the system may fail. When these malicious injection codes are executed, cloud servers behave erratically on a regular basis, and during this abnormal behavior, attackers may take advantage of the system's security flaws to get unauthorized access to sensitive and confidential data. Abuse of cloud services : One of the biggest risks to cloud computing is the abusive usage of cloud services 47,48 . Large amounts of data may now be hosted by both small and enterprise‐level enterprises without much effort thanks to the growth of cloud services.…”
Section: Threats In Cloud Computingmentioning
confidence: 99%
See 3 more Smart Citations
“…The detection and handling of these threats is made difficult by the malicious threats' execution, which also raises the likelihood that the system may fail. When these malicious injection codes are executed, cloud servers behave erratically on a regular basis, and during this abnormal behavior, attackers may take advantage of the system's security flaws to get unauthorized access to sensitive and confidential data. Abuse of cloud services : One of the biggest risks to cloud computing is the abusive usage of cloud services 47,48 . Large amounts of data may now be hosted by both small and enterprise‐level enterprises without much effort thanks to the growth of cloud services.…”
Section: Threats In Cloud Computingmentioning
confidence: 99%
“…For instance, equipped users have the potential to directly or indirectly increase security risks and, as a result, violate the service provider's conditions of use. Data loss : Attackers seek to obtain sensitive data without authorization by executing a number of assaults. Such assaults may also result in significant data loss 47,48 when processing the necessary data on heterogeneous cloud servers and communicating with them. The intensive assault efforts may affect cloud systems in a variety of ways.…”
Section: Threats In Cloud Computingmentioning
confidence: 99%
See 2 more Smart Citations