2013
DOI: 10.7790/ajtde.v1n1.4
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity threats in cloud computing

Abstract: Recently we have witnessed the emergence of cloud computing as a new computing model that offers resources (e.g., compute, storage, network, etc.) as general utilities to be leased and released on-demand by users through the Internet. Given its innovative nature and reliance on the Internet, the cloud inherently comes with a number of vulnerabilities that increase the space for cyber attacks. This paper aims to provide an overview of major potential risks to privacy and security in the cloud. Various emerging … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 29 publications
0
0
0
Order By: Relevance
“…Figure 2 illustrates the thematic areas that emerged from analysis of the extracted studies. Thematic areas that still prevalent in cybersecurity cloud-based online learning area: data access (confidentiality), data accuracy (integrity), data accessible to rightful people who need it (availability), privacy paradox, authentication, identification, trust, exploits, vulnerabilities, threats, cybersecurity behavior analysis, cybersecurity awareness, system thinking cybersecurity, information security and cybersecurity policies, and attacks (flooding, blocking, blended) [8][9][10][11][12][13][14][15][16][17][18][19][20]. For example, flooding attack creates numerous requests in the form of small messages which block the entire season preventing the cloud-based client (student/lecturer/administrator) from obtaining access.…”
Section: Research Reportmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 2 illustrates the thematic areas that emerged from analysis of the extracted studies. Thematic areas that still prevalent in cybersecurity cloud-based online learning area: data access (confidentiality), data accuracy (integrity), data accessible to rightful people who need it (availability), privacy paradox, authentication, identification, trust, exploits, vulnerabilities, threats, cybersecurity behavior analysis, cybersecurity awareness, system thinking cybersecurity, information security and cybersecurity policies, and attacks (flooding, blocking, blended) [8][9][10][11][12][13][14][15][16][17][18][19][20]. For example, flooding attack creates numerous requests in the form of small messages which block the entire season preventing the cloud-based client (student/lecturer/administrator) from obtaining access.…”
Section: Research Reportmentioning
confidence: 99%
“…Furthermore, SaaS security issue talks to the idea that it must provide integrity. confidentiality and availability across all software application [8]. The most important component is user verification, as the administration of passwords might damage security.…”
Section: Introductionmentioning
confidence: 99%