2015
DOI: 10.14257/ijgdc.2015.8.2.15
|View full text |Cite
|
Sign up to set email alerts
|

Study on Cloud Security Risk and Remedy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 15 publications
(14 reference statements)
0
11
0
Order By: Relevance
“…Even though data are stored away from the client system, there could be a possibility of data loss or leakage. As a result, data leakage is becoming a critical security issue among the various security issues in the cloud environment [34]. The loss and/or leakage of data may be carried out by internal threat actors such as disgruntled employees, contractors, and other partners.…”
Section: Data Loss or Leakage Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though data are stored away from the client system, there could be a possibility of data loss or leakage. As a result, data leakage is becoming a critical security issue among the various security issues in the cloud environment [34]. The loss and/or leakage of data may be carried out by internal threat actors such as disgruntled employees, contractors, and other partners.…”
Section: Data Loss or Leakage Issuesmentioning
confidence: 99%
“…These kinds of attacks have typically targeted PaaS and IaaS providers. Cloud providers must be concerned about issues such as malicious data hosting, password cracking, key cracking, the building of rainbow tables, the launching of dynamic attack points, CAPTCHA, control, and botnet command solving farms [34].…”
Section: Abuse Of Cloud Computingmentioning
confidence: 99%
“…An Intrusion Prevention Systems (IPS) was suggested by [5] in identifying attacking point through pre-existing signatures, however, it is ineffective with legitimate content with bad intentions, even firewalls are ineffective as they can be easily bypassed. An avoidance strategy called Service Migration was proposed by [33], which has a monitoring agent and an application constantly probing each other to observe available bandwidth from both directions.…”
Section: Major Challenges From Abuse Of Cloud Service Threat and Avaimentioning
confidence: 99%
“…A study [5] has proposed three secured ways to cloud environment as follow: First is to secure transmission with tunneling and by using of virtual circuits. Second is to secure the servers by placing IDS, separating servers for different applications, storing hashed values, data replication and threshold for server load.…”
Section: ) Intrusion Detection Systems (Ids)mentioning
confidence: 99%
See 1 more Smart Citation