2,560 Hits in 5.1 sec

Secure cloud maintenance

Sören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter
2012 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12  
To protect cloud users against such insiders, we propose a novel approach that enables a security team to protect privacy and integrity of cloud users' workloads against attacks by system administrators  ...  For manual maintenance operations, we propose five finegrained privilege levels that balance the security objectives of cloud users with the operational requirements of cloud administrators.  ...  Today, no technology can protect against insider attacks during such maintenance activities.  ... 
doi:10.1145/2414456.2414505 dblp:conf/ccs/BleikertzKNS12 fatcat:vdly4nyqmngknc63vg4mvvinbq

Security Issues on Cloud Computing [article]

Harit Shah, Sharma Shankar Anandane, Shrikanth
2013 arXiv   pre-print
Amongst these are security and trust issues, since the user data has to be released to the Cloud and thus leaves the protection sphere of the data owner.  ...  This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena.  ...  It is critical therefore that consumers of cloud services understand what providers are doing to detect and defend against the malicious insider D.  ... 
arXiv:1308.5996v1 fatcat:bzctt2snancsrougtutreodiiq

Secure virtualization for cloud computing

Flavio Lombardi, Roberto Di Pietro
2011 Journal of Network and Computer Applications  
In particular: (a) effectiveness is shown testing our prototype against attacks known in the literature; (b) performance evaluation of the ACPS prototype is carried out under different types of workload  ...  In particular, we propose a novel architecture, Advanced Cloud Protection System (ACPS), aimed at guaranteeing increased security to cloud resources.  ...  Possible attacks against cloud systems can be classified as follows (see also Smith et al., 2006) : Cloud security model CAT1 Resource attacks against CPs; CAT2 Resource attacks against SPs; CAT3  ... 
doi:10.1016/j.jnca.2010.06.008 fatcat:uvr5mkmxizhjtbzetlp4tpggz4

The Trusted Cloud: Addressing Security and Compliance [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
For virtual machine and workload data protection, cloud user organizations need a method to securely place workloads into the cloud, as well as store and use data there.  ...  Protecting against attacks with standardized infrastructure when the same vulnerability can exist at many places, owing to the standardization. • Support for multi-tenant environments.  ... 
doi:10.1007/978-1-4302-6146-9_2 fatcat:k2wmlqogxzfbvhr6mle2wuwgze

On Technical Security Issues in Cloud Computing

Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono
2009 2009 IEEE International Conference on Cloud Computing  
Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protectionsphere of the data owner.  ...  This paper focusses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations  ...  In SOAP messages, the EncryptedKey element must appear inside the security header.  ... 
doi:10.1109/cloud.2009.60 dblp:conf/IEEEcloud/JensenSGI09 fatcat:t5jsk2ib3bahphsokb3iyi3rk4

Cloud Computing Security: A Survey

Issa Khalil, Abdallah Khreishah, Muhammad Azeem
2014 Computers  
We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks  ...  to address the unique cloud security challenges.  ...  To achieve comprehensive cloud security, the data and cloud infrastructure must be protected against known/unknown attacks across all cloud components.  ... 
doi:10.3390/computers3010001 fatcat:a2xfh7oahzazpij4q7xfu2y67u

Securing Cloud Computing Through IT Governance

Salman M. Faizi, Shawon Rahman
2021 Information Technology in Industry  
Thus, IT governance must be applied to cloud computing information security to help manage the risks associated with cloud computing information security.  ...  While cloud computing presents tremendous opportunities, it comes with risks as well. Information security is one of the top risks in cloud computing.  ...  However, intrusion detection systems and firewalls can provide some level of protection against port scanning attacks [40] .  ... 
doi:10.17762/itii.v7i1.62 fatcat:hbhkbej5qnbxdltv7xibhpa3wa

Securing Cloud Computing Through IT Governance

Salman M. Faizi, Shawon Rahman
2019 Zenodo  
Keywords Business alignment, cloud computing, cloud computing security, information security, IT governance.  ...  Thus, IT governance must be applied to cloud computing information security to help manage the risks associated with cloud computing information security.  ...  However, intrusion detection systems and firewalls can provide some level of protection against port scanning attacks [40] .  ... 
doi:10.5281/zenodo.2572573 fatcat:4ulqe5rx6zfwxejkv6vuojdnku

In Retrospect of Cloud Security Issues

2019 International Journal of Engineering and Advanced Technology  
.But the passion towards adopting cloud have overridden the security threats.  ...  Computing ".A desperate demand for data sharing and handling enterprise applications have called upon for cloud computing .A blocking wind for leveraging cloud computing technology is the aspect of security  ...  Main security challenges are  Shared technologies vulnerabilities  Data breach  Account or service traffic hijacking  Denial of service (DOS)  Malicious insiders Figure 4: cloud platform attack  ... 
doi:10.35940/ijeat.b2658.129219 fatcat:56w2imsyn5bgbfoz4yt7q5jsve

Government Cloud Computing and National Security

Hedaia-t-Allah Nabil Abd Al Ghaffar
2020 Review of Economics and Political Science  
However, shifting to cloud computing raises a lot of security concerns.  ...  main vulnerabilities that could affect national security in cases of government cloud computing usage.  ...  According to Klare and Thomas, security is: "security involves more than protection against military attack [. . .] ecological, economic and demographic trends pose serious challenges to developed countries  ... 
doi:10.1108/reps-09-2019-0125 fatcat:yvyrh444ovfn3ls5xxkrfqaymm


2014 Journal of Defense Resources Management  
Clouds minimize the need for user involvement by masking technical details such as software upgrades, licenses, and maintenance from its customers.  ...  Since a cloud aggregates resources, cloud providers charter expert security personnel while typical companies could be limited with a network administrator who might not be well versed in cyber security  ...  Data Protection Data breaches caused by insiders could be either accidental or intentional.  ... 
doaj:37dee7b09a954d0b8072f516a4083547 fatcat:5en54khf7bdnvkchzb7atsswha

Virtualization Technologies and Cloud Security: advantages, issues, and perspectives [article]

Roberto Di Pietro, Flavio Lombardi
2018 arXiv   pre-print
Nevertheless, security and privacy issues are still present in virtualization technology and hence in Cloud platforms.  ...  The objective of this paper is to shed light on current virtualization technology and its evolution from the point of view of security, having as an objective its applications to the Cloud setting.  ...  Cloak provides protection against cache-based side-channel attacks for SGX enclaves.  ... 
arXiv:1807.11016v2 fatcat:i724ystx2zcqtgm2aq7bkkkedm

Requirements Capture and Comparative Analysis of Cloud Security Techniques

Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim
2015 International Journal of Grid and Distributed Computing  
However, the diversity of these services, delivered through Cloud infrastructures, increases its vulnerability to security incidents and attacks.  ...  The aim of this paper is to present the state-of-the-art Cloud security and to explore research directions and technology trends to address the protection of Cloud infrastructures.  ...  Legitimate tenants can run network-intensive workloads and protect against malicious tenants that launch denial of service attacks.  ... 
doi:10.14257/ijgdc.2015.8.2.25 fatcat:2vjojoyr5be7xpc7kal77mssqy

Cyber defenses for physical attacks and insider threats in cloud computing

Jakub Szefer, Pramod Jamkhedkar, Diego Perez-Botero, Ruby B. Lee
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
physical attack, even by an insider.  ...  While much work has looked at protection from software (cyber) threats, very few have looked at physical attacks and physical security in data centers.  ...  CYBER-PHYSICAL DEFENSES Our work is based on a cloud computing paradigm where computation is performed inside VMs. Our goal is to protect code and data inside the VMs from physical attackers.  ... 
doi:10.1145/2590296.2590310 dblp:conf/ccs/SzeferJPL14 fatcat:yt45syx3nvbs3lsacnusckrufy

Securing the Deployment of Cloud-Hosted Services for Guaranteeing Multitenancy Isolation [chapter]

Laud Charles Ochei
2020 Cloud Computing Security [Working Title]  
This study presents CLAMP (Cloud-based architectural approach for securing services through Multitenancy deployment Patterns) to securing the deployment of cloud-hosted services in a way that guarantees  ...  Multitenancy introduces significant error and security challenges in the cloud depending on the location of the functionality to be shared and the required degree of isolation between the tenants.  ...  In this way, potentially sensitive data are at risk from insider attacks.  ... 
doi:10.5772/intechopen.92142 fatcat:feu2vj57aje75di5vfc6vuxmc4
« Previous Showing results 1 — 15 out of 2,560 results