Muhammad Dawood
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Dawood, Muhammad; Tu, Shanshan; Xiao, Chuangbai; Alasmary, Hisham; Waqas, Muhammad; Rehman, Sadaqat Ur
Authors
Shanshan Tu
Chuangbai Xiao
Hisham Alasmary
Muhammad Waqas
Dr Sadaqat Rehman S.Rehman15@salford.ac.uk
Lecturer in Artificial Intelligence
Contributors
Alexander Zaslavski
Editor
Abstract
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security.
Citation
Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (in press). Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry, 15(11), 1981. https://doi.org/10.3390/sym15111981
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 20, 2023 |
Online Publication Date | Oct 26, 2023 |
Deposit Date | Nov 14, 2023 |
Publicly Available Date | Nov 14, 2023 |
Journal | Symmetry |
Publisher | MDPI |
Peer Reviewed | Peer Reviewed |
Volume | 15 |
Issue | 11 |
Pages | 1981 |
DOI | https://doi.org/10.3390/sym15111981 |
Keywords | cloud computing, security threats, security attacks |
Files
Published Version
(380 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
A Two-branch Edge Guided Lightweight Network for infrared image saliency detection
(2024)
Journal Article
Advancements in intrusion detection: A lightweight hybrid RNN-RF model
(2024)
Journal Article
ENSO dataset & comparison of deep learning models for ENSO forecasting
(2024)
Journal Article
Deep learning-based forecasting of electricity consumption
(2024)
Journal Article
Saliency Guided Siamese Attention Network for Infrared Ship Target Tracking
(2024)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search