Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus

T. Singh, Ajay Mahaputra Kumar
{"title":"Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus","authors":"T. Singh, Ajay Mahaputra Kumar","doi":"10.1109/ICECCT56650.2023.10179727","DOIUrl":null,"url":null,"abstract":"Cloud computing security is a broad term that covers a wide range of security and privacy issues for businesses that use multi-cloud services. The service providers must take several factors into account when addressing security for their clients, including access and identity control, in-transit, and other security factors such as confidentiality, vulnerability management, threats, and audits. This paper takes a close look at each of these areas of cloud security and shows how multi-cloud service providers can protect themselves and move forward. It also talks about the problems with protecting systems that use more than one cloud and gives ways to deal with these problems. The reader should understand all of the security concerns that come with multi-cloud setups and how to deal with them in light of the latest cyber threats. The sole motivation of this paper is to raise awareness about multi-cloud service security in different aspects and its impact. Nessus, which is a well-known security tool, has been used to find vulnerabilities and other critical security concerns. Overall, experiments have been performed on three different websites: “www.cuchd.in”, “indiapost.gov.in” and “ajaykumar.in”. Despite this, the mitigation approaches for each vulnerability are explained systematically.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT56650.2023.10179727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cloud computing security is a broad term that covers a wide range of security and privacy issues for businesses that use multi-cloud services. The service providers must take several factors into account when addressing security for their clients, including access and identity control, in-transit, and other security factors such as confidentiality, vulnerability management, threats, and audits. This paper takes a close look at each of these areas of cloud security and shows how multi-cloud service providers can protect themselves and move forward. It also talks about the problems with protecting systems that use more than one cloud and gives ways to deal with these problems. The reader should understand all of the security concerns that come with multi-cloud setups and how to deal with them in light of the latest cyber threats. The sole motivation of this paper is to raise awareness about multi-cloud service security in different aspects and its impact. Nessus, which is a well-known security tool, has been used to find vulnerabilities and other critical security concerns. Overall, experiments have been performed on three different websites: “www.cuchd.in”, “indiapost.gov.in” and “ajaykumar.in”. Despite this, the mitigation approaches for each vulnerability are explained systematically.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
分析使用Nessus的多云服务提供商的安全和隐私问题
云计算安全是一个广泛的术语,涵盖了使用多云服务的企业的广泛安全和隐私问题。服务提供者在为其客户处理安全问题时必须考虑几个因素,包括访问和身份控制、传输中以及其他安全因素,如机密性、漏洞管理、威胁和审计。本文将详细介绍云安全的每个领域,并展示多云服务提供商如何保护自己并向前发展。它还讨论了保护使用多个云的系统的问题,并给出了处理这些问题的方法。读者应该了解多云设置带来的所有安全问题,以及如何根据最新的网络威胁来处理这些问题。本文的唯一动机是提高人们对多云服务安全在不同方面及其影响的认识。Nessus是一个众所周知的安全工具,它被用来发现漏洞和其他关键的安全问题。总的来说,实验是在三个不同的网站上进行的:“www.cuchd.in”、“indiapost.gov.in”和“ajaykumar.in”。尽管如此,系统地解释了每个漏洞的缓解方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model of Markovian Queue with Catastrophe, Restoration and Balking Nibble Based Two Bit Invert Coding Technique for Serial Network on Chip Links Hesitant Triangular Fuzzy Dombi Operators and Its Applications Fuel Cost Optimization of Coal-Fired Power Plants using Coal Blending Proportions An Efficient Classification for Light Motor Vehicles using CatBoost Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1