Cloud Security and Security Challenges Revisited
- URL: http://arxiv.org/abs/2405.11350v1
- Date: Sat, 18 May 2024 17:42:02 GMT
- Title: Cloud Security and Security Challenges Revisited
- Authors: Fabian Süß, Marco Freimuth, Andreas Aßmuth, George R. S. Weir, Bob Duncan,
- Abstract summary: We revisit attacks on Cloud services and Cloud-related attack vectors that have been published in recent years.
Based on these findings, we apply a security metric in order to rank all these Cloud-related security challenges concerning their severity.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In recent years, Cloud Computing has transformed local businesses and created new business models on the Internet- and Cloud services are still flourishing. But after the emphatic hype in the early years, a more realistic perception of Cloud services has emerged. One reason for this surely is that today, Cloud Computing is considered as an established and well-accepted technology and no longer as a technical novelty. But the second reason for this assessment might also be numerous security issues that Cloud Computing in general or specific Cloud services have experienced since then. In this paper, we revisit attacks on Cloud services and Cloud-related attack vectors that have been published in recent years. We then consider successful or proposed solutions to cope with these challenges. Based on these findings, we apply a security metric in order to rank all these Cloud-related security challenges concerning their severity. This should assist security professionals to prioritize their efforts toward addressing these issues.
Related papers
- Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm [0.0]
"The cloud" refers to a collection of interconnected computing resources made possible by an extensive, real-time communication network like the internet.
The exponential expansion of cloud computing has made the rapid expansion of cloud services very remarkable.
Models of security that are relevant to cloud computing include confidentiality, authenticity, accessibility, data integrity, and recovery.
arXiv Detail & Related papers (2024-04-14T15:38:34Z) - Leveraging AI Planning For Detecting Cloud Security Vulnerabilities [15.503757553097387]
Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration.
Access control misconfigurations are often the primary driver for cloud attacks.
We develop a PDDL model for detecting security vulnerabilities which can for example lead to widespread attacks such as ransomware.
arXiv Detail & Related papers (2024-02-16T03:28:02Z) - Security and Privacy Issues in Cloud Storage [0.0]
The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures.
Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about.
In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of.
arXiv Detail & Related papers (2024-01-08T18:27:57Z) - Exploring Security Practices in Infrastructure as Code: An Empirical
Study [54.669404064111795]
Cloud computing has become popular thanks to the widespread use of Infrastructure as Code (IaC) tools.
scripting process does not automatically prevent practitioners from introducing misconfigurations, vulnerabilities, or privacy risks.
Ensuring security relies on practitioners understanding and the adoption of explicit policies, guidelines, or best practices.
arXiv Detail & Related papers (2023-08-07T23:43:32Z) - Risk-optimized Outlier Removal for Robust 3D Point Cloud Classification [54.286437930350445]
This paper highlights the challenges of point cloud classification posed by various forms of noise.
We introduce an innovative point outlier cleansing method that harnesses the power of downstream classification models.
Our proposed technique not only robustly filters diverse point cloud outliers but also consistently and significantly enhances existing robust methods for point cloud classification.
arXiv Detail & Related papers (2023-07-20T13:47:30Z) - Cloud-Native Computing: A Survey from the Perspective of Services [41.25934971576225]
Cloud-native computing is the most influential development principle for web applications.
This paper surveys key issues during the life-cycle of cloud-native applications from the perspective of services.
arXiv Detail & Related papers (2023-06-26T03:32:35Z) - Privacy-Preserving Cloud Computing: Ecosystem, Life Cycle, Layered
Architecture and Future Roadmap [0.0]
This survey paper on privacy-preserving cloud computing can help pave the way for future research in related areas.
This paper helps to identify existing trends by establishing a layered architecture along with a life cycle and an ecosystem for privacy-preserving cloud systems.
arXiv Detail & Related papers (2022-04-23T18:47:26Z) - Unsupervised Point Cloud Representation Learning with Deep Neural
Networks: A Survey [104.71816962689296]
Unsupervised point cloud representation learning has attracted increasing attention due to the constraint in large-scale point cloud labelling.
This paper provides a comprehensive review of unsupervised point cloud representation learning using deep neural networks.
arXiv Detail & Related papers (2022-02-28T07:46:05Z) - Edge-Cloud Polarization and Collaboration: A Comprehensive Survey [61.05059817550049]
We conduct a systematic review for both cloud and edge AI.
We are the first to set up the collaborative learning mechanism for cloud and edge modeling.
We discuss potentials and practical experiences of some on-going advanced edge AI topics.
arXiv Detail & Related papers (2021-11-11T05:58:23Z) - PoinTr: Diverse Point Cloud Completion with Geometry-Aware Transformers [81.71904691925428]
We present a new method that reformulates point cloud completion as a set-to-set translation problem.
We also design a new model, called PoinTr, that adopts a transformer encoder-decoder architecture for point cloud completion.
Our method outperforms state-of-the-art methods by a large margin on both the new benchmarks and the existing ones.
arXiv Detail & Related papers (2021-08-19T17:58:56Z) - Reasons behind growing adoption of Cloud after Covid-19 Pandemic and
Challenges ahead [0.0]
Covid-19 has made cloud adoption an immediate priority for Organisation rather than a slowly approached future transformation.
The benefits of Cloud lies in the fact that employees rather engineers of an enterprise are no more dependent on the closed hardware-based IT infrastructure.
This has raised a huge demand for skilled Cloud specialist who can manage and support the systems running on cloud across different regions of the world.
arXiv Detail & Related papers (2021-02-27T10:32:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.