2015 Third World Conference on Complex Systems (WCCS) 2015
DOI: 10.1109/icocs.2015.7483283
|View full text |Cite
|
Sign up to set email alerts
|

State-of-the-art of cloud computing cyber-security

Abstract: During the last few years, there has been a rapid and an increasing development and adoption of cloud computing systems, technologies, applications and services. This is owing mainly to many benefits this technology offers for businesses and organizations. However, Cyber-security is considered among the most important issues and concerns for widespread adoption of cloud computing. Among the major issues related with Cloud Computing security we can mention data security, intrusions attacks, confidentiality and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…The cloud enables businesses to reduce operational costs bypassing the need for an in-house IT department and renting the infrastructure from their provider, relieving the businesses from buying the hardware themselves (Alouane & Bakkali 2015;Kouatli 2016;Pieters 2011). However, the ease and efficiency of the cloud comes with privacy risks and the issue of control over data processing (Bennasar et al 2015) as customer's data is processed remotely in unknown machines (Alouane & Bakkali 2015). Pearson (2012) argues that there needs to be an appropriate level of access control within the cloud environment to protect the security of resources as cloud computing may increase the risk of access to confidential information.…”
Section: Outlining the Identified Ethical Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…The cloud enables businesses to reduce operational costs bypassing the need for an in-house IT department and renting the infrastructure from their provider, relieving the businesses from buying the hardware themselves (Alouane & Bakkali 2015;Kouatli 2016;Pieters 2011). However, the ease and efficiency of the cloud comes with privacy risks and the issue of control over data processing (Bennasar et al 2015) as customer's data is processed remotely in unknown machines (Alouane & Bakkali 2015). Pearson (2012) argues that there needs to be an appropriate level of access control within the cloud environment to protect the security of resources as cloud computing may increase the risk of access to confidential information.…”
Section: Outlining the Identified Ethical Issuesmentioning
confidence: 99%
“… 1 paper discusses confidentiality issues in the cloud: Alouane, 2015.  2 papers mentioned security issues relating to accessibility to information stored in the cloud and the indefinite life the cloud gives that information: Bennasar et al, 2015; Alouane, 2015. 1 paper addresses the issue of maintaining data integrity in the cloud:Bennasar et al, 2015…”
mentioning
confidence: 99%
“…The cloud enables businesses to reduce operational costs bypassing the need for an in-house IT department and renting the infrastructure from their provider, relieving the businesses from buying the hardware themselves (Alouane & Bakkali 2015; Kouatli 2016; Pieters 2011). However, the ease and efficiency of the cloud comes with privacy risks and the issue of control over data processing (Bennasar et al 2015) as customer's data is processed remotely in unknown machines (Alouane & Bakkali 2015). Pearson (2012) argues that there needs to be an appropriate level of access control within the cloud environment to protect the security of resources as cloud computing may increase the risk of access to confidential information.…”
Section: Control Of Informationmentioning
confidence: 99%
“…Cloud computing security issues generally relate to data and information security but are explicitly separated in this analysis as cloud services exposes information and data to new threats. 3 papers address privacy issues that may arise in the cloud: Pearson, 2013; Alone, 2015. papers discuss trust issues in the cloud:Pearson, 2013; Alone, 2015, Pieters, 2011  1 paper discusses confidentiality issues in the cloud: Alouane, 2015. 2 papers mentioned security issues relating to accessibility to information stored in the cloud and the indefinite life the cloud gives that information:Bennasar et al, 2015;Alouane, 2015.  1 paper addresses the issue of maintaining data integrity in the cloud:Bennasar et al, 2015…”
mentioning
confidence: 99%
“…Due to the sophistication of those attacks, they can bypass existing security systems and largely infiltrate the target network or systems . Nowadays, accessing cloud and hosting data may also lead to severe cybersecurity attacks like data breaches, compromised credentials, Denial of Service (DoS) attacks, hacked interfaces and APIs, and permanent data loss, all of which can lead to severe consequences. The prevention and detection of those campaigns are challenging because the attackers continuously change and evolve their advanced techniques and methods to stay undetected.…”
Section: Introductionmentioning
confidence: 99%