Cloud Security Issues Based on People, Process and Technology Model: A Survey

Fariba Ghaffari, Hossein Gharaee, Abouzar Arabsorkhi
{"title":"Cloud Security Issues Based on People, Process and Technology Model: A Survey","authors":"Fariba Ghaffari, Hossein Gharaee, Abouzar Arabsorkhi","doi":"10.1109/ICWR.2019.8765295","DOIUrl":null,"url":null,"abstract":"Combination of utility computing and World Wide Web is base of the cloud computing. The intrinsic features of cloud computing have produced many competitive and computing benefits. The development of cloud computing and the expansion of service providers in this area has led to increase in investment in cloud computing. Large number of users on the one hand and increasing the number of sensitive data on cloud environments on the other hand, caused a dramatic growth in the motivation of malicious activities and as a result of security challenges. Solving the cloud computing security challenges need to proper knowledge of the security issues and the scope of their resolution. Security is a long-term product of interaction between people, process and technology. This categorization is based on possible solutions to security issues. Thus, the division of threats in these three areas can help the managers and security sectors to solve the security problems. Hence, in this paper, along with the comprehensive identification of cyber security challenges, we try to address these threats to categories of people, process, and technologies, in order to find cost effective, efficient and feasible security solutions based on this basis.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"28 1","pages":"196-202"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 5th International Conference on Web Research (ICWR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWR.2019.8765295","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Combination of utility computing and World Wide Web is base of the cloud computing. The intrinsic features of cloud computing have produced many competitive and computing benefits. The development of cloud computing and the expansion of service providers in this area has led to increase in investment in cloud computing. Large number of users on the one hand and increasing the number of sensitive data on cloud environments on the other hand, caused a dramatic growth in the motivation of malicious activities and as a result of security challenges. Solving the cloud computing security challenges need to proper knowledge of the security issues and the scope of their resolution. Security is a long-term product of interaction between people, process and technology. This categorization is based on possible solutions to security issues. Thus, the division of threats in these three areas can help the managers and security sectors to solve the security problems. Hence, in this paper, along with the comprehensive identification of cyber security challenges, we try to address these threats to categories of people, process, and technologies, in order to find cost effective, efficient and feasible security solutions based on this basis.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于人员、流程和技术模型的云安全问题:调查
效用计算与万维网的结合是云计算的基础。云计算的固有特性产生了许多竞争优势和计算优势。云计算的发展和服务提供商在这一领域的扩展导致了云计算投资的增加。一方面是大量的用户,另一方面是云环境中敏感数据数量的增加,导致恶意活动的动机急剧增长,同时也带来了安全挑战。解决云计算安全挑战需要正确了解安全问题及其解决方案的范围。安全是人、过程和技术相互作用的长期产物。这种分类基于安全问题的可能解决方案。因此,对这三个领域的威胁进行划分,可以帮助管理者和安全部门解决安全问题。因此,在本文中,随着对网络安全挑战的全面识别,我们试图解决这些对人员,流程和技术类别的威胁,以便在此基础上找到具有成本效益,高效和可行的安全解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things A Sentiment Aggregation System based on an OWA Operator Using Web Mining in the Analysis of Housing Prices: A Case study of Tehran An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features Mobility-Aware Parent Selection for Routing Protocol in Wireless Sensor Networks using RPL
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1