Authors | A. Naseer, H. Zhiqui and A. Ali |
Editors | J. E. Guerrero |
Title | Cloud Computing Security Threats and Attacks with Their Mitigation Techniques |
Afilliation | Software Engineering |
Project(s) | Data-Driven Software Engineering Department |
Status | Published |
Publication Type | Proceedings, refereed |
Year of Publication | 2017 |
Conference Name | International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) |
Pagination | 244-251 |
Date Published | 10/2017 |
Publisher | IEEE |
Place Published | Nanjing, China |
ISBN Number | 978-1-5386-2209-4 |
Keywords | Cloud computing, mitigation techniques, security attacks, security requirements, security threats |
Abstract | Cloud computing is a rapidly growing internet technology for facilitating various services to its consumers. It proposes many striking promises to the general public or big companies like Amazon, Google, Microsoft, IBM, etc., to maintain and upgrade their position in a fast-growing cloud computing environment and to enhance their services for a large number of users. However, with the fast development and enticing offerings, many issues associated with this technology also arise, which need to be addressed, with security being the strongest barrier to its adoption. Security concerns are an active area of research, which needs to be addressed properly to avoid security threats and attacks that are disasters for both service providers and service consumers. This paper highlights cloud computing architectural principles, cloud computing key security requirements, cloud computing security threats and cloud computing security attacks with their mitigation techniques, and future research challenges. |
URL | http://ieeexplore.ieee.org/document/8250365/ |
DOI | 10.1109/CyberC.2017.37 |
Citation Key | naseer2017:cloud |