2017
DOI: 10.1016/j.compeleceng.2016.03.004
|View full text |Cite
|
Sign up to set email alerts
|

Cloud security: Emerging threats and current solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
63
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 125 publications
(63 citation statements)
references
References 6 publications
0
63
0
Order By: Relevance
“…network-level attacks that can affect the confidentiality and integrity of every networked system are: packet sniffing, IP spoofing, ARP spoofing and Man In The Middle attacks (MITM) [27,85,62]. Among network level issues that can affect integrity and confidentiality, MITM attacks are much more critical and deserve special attention.…”
Section: Confidentiality and Integrity Issues Well-known Examples Ofmentioning
confidence: 99%
“…network-level attacks that can affect the confidentiality and integrity of every networked system are: packet sniffing, IP spoofing, ARP spoofing and Man In The Middle attacks (MITM) [27,85,62]. Among network level issues that can affect integrity and confidentiality, MITM attacks are much more critical and deserve special attention.…”
Section: Confidentiality and Integrity Issues Well-known Examples Ofmentioning
confidence: 99%
“…Cloud operating systems are up to date on patches and upgrades, redundancy in disks ensures rapid recovery from hardware failures, tools such as Docker can containerize an entire environment and allow for rapid restarts in case of problems, and the fact that cloud systems need to meet commercial level security/data confidentiality requirements drives additional levels of system resilience. Coppolino et al (2017) provide a good review of cloud security. While their paper is aimed more at business needs, their observations and conclusions are equally valid for scientific data.…”
Section: Securitymentioning
confidence: 99%
“…This foothold in the visualized environment could be extended to target the shared data storage, further compromising the confidentiality, integrity, and availability of the entire infrastructure [3][4][5]. Insider threats are a real possibility and nothing new in the computer world but with the cloud the risks are greater due to the unprecedented amount of information and multiclients data [17]. The Cloud Security Alliance (CSA) affectionately calls its top cloud threats in 2016 the treacherous twelve, 12 security concerns associated with cloud technology [18].…”
Section: Vulnerabilities In Cloudmentioning
confidence: 99%