{"title":"Cloud Security Issues Based on People, Process and Technology Model: A Survey","authors":"Fariba Ghaffari, Hossein Gharaee, Abouzar Arabsorkhi","doi":"10.1109/ICWR.2019.8765295","DOIUrl":null,"url":null,"abstract":"Combination of utility computing and World Wide Web is base of the cloud computing. The intrinsic features of cloud computing have produced many competitive and computing benefits. The development of cloud computing and the expansion of service providers in this area has led to increase in investment in cloud computing. Large number of users on the one hand and increasing the number of sensitive data on cloud environments on the other hand, caused a dramatic growth in the motivation of malicious activities and as a result of security challenges. Solving the cloud computing security challenges need to proper knowledge of the security issues and the scope of their resolution. Security is a long-term product of interaction between people, process and technology. This categorization is based on possible solutions to security issues. Thus, the division of threats in these three areas can help the managers and security sectors to solve the security problems. Hence, in this paper, along with the comprehensive identification of cyber security challenges, we try to address these threats to categories of people, process, and technologies, in order to find cost effective, efficient and feasible security solutions based on this basis.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"28 1","pages":"196-202"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 5th International Conference on Web Research (ICWR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWR.2019.8765295","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Combination of utility computing and World Wide Web is base of the cloud computing. The intrinsic features of cloud computing have produced many competitive and computing benefits. The development of cloud computing and the expansion of service providers in this area has led to increase in investment in cloud computing. Large number of users on the one hand and increasing the number of sensitive data on cloud environments on the other hand, caused a dramatic growth in the motivation of malicious activities and as a result of security challenges. Solving the cloud computing security challenges need to proper knowledge of the security issues and the scope of their resolution. Security is a long-term product of interaction between people, process and technology. This categorization is based on possible solutions to security issues. Thus, the division of threats in these three areas can help the managers and security sectors to solve the security problems. Hence, in this paper, along with the comprehensive identification of cyber security challenges, we try to address these threats to categories of people, process, and technologies, in order to find cost effective, efficient and feasible security solutions based on this basis.