Skip to main content

Research Repository

Advanced Search

Cyberattacks and Security of Cloud Computing: A Complete Guideline

Dawood, Muhammad; Tu, Shanshan; Xiao, Chuangbai; Alasmary, Hisham; Waqas, Muhammad; Rehman, Sadaqat Ur

Cyberattacks and Security of Cloud Computing: A Complete Guideline Thumbnail


Authors

Muhammad Dawood

Shanshan Tu

Chuangbai Xiao

Hisham Alasmary

Muhammad Waqas



Contributors

Alexander Zaslavski
Editor

Abstract

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security.

Citation

Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (in press). Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry, 15(11), 1981. https://doi.org/10.3390/sym15111981

Journal Article Type Article
Acceptance Date Oct 20, 2023
Online Publication Date Oct 26, 2023
Deposit Date Nov 14, 2023
Publicly Available Date Nov 14, 2023
Journal Symmetry
Publisher MDPI
Peer Reviewed Peer Reviewed
Volume 15
Issue 11
Pages 1981
DOI https://doi.org/10.3390/sym15111981
Keywords cloud computing, security threats, security attacks

Files




You might also like



Downloadable Citations