Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: Multi-cloud service, SOC, system organization control, data loss prevention, DLP, identity and access management, IAM.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 600

References:


[1] Basu, Cloud computing security challenges & solutions-A survey, Annual Computing and Communication Workshop and Conference (CCWC) 2018.
[2] Verma, Cloud computing security issues: a stakeholder’s perspective., SN Computer Science, 1(6), 1-8, 2020.
[3] Alsmadi, Sharing and storage behavior via cloud computing: Security and privacy in research and practice., Computers in Human Behavior, 85, 218-226, 2018.
[4] Mondal, Cloud computing security issues & challenges: A review. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-5). IEEE., 2020.
[5] G. Kumar, A review on data protection of cloud computing security, benefits, risks and suggestions. PDF. United International Journal for Research & Technology, 1(2), 26, 2019.
[6] Garg, Emerging trends in cloud computing security: A bibliometric analyses. IET Software, 13(3), 223-231, 2019.
[7] Rupra, A cloud computing security assessment framework for small and medium enterprises. Journal of Information Security, 11(4), 201-224, 2020.
[8] Goumidi, Vehicular cloud computing security: A survey. Arabian Journal for Science and Engineering, 45(4), 2473-2499, 2020.
[9] Raj, An exploration on cloud computing security strategies and issues. In Inventive Communication and Computational Technologies (pp. 549-562). Springer, Singapore., 2020.
[10] El-Yahyaoui, A verifiable fully homomorphic encryption scheme for cloud computing security. Technologies, 7(1), 21, 2019.
[11] Gan, Dynamical propagation model of malware for cloud computing security. IEEE Access, 8, 20325-20333, 2020.
[12] L. Hasimi, Cost-effective solutions in cloud computing security. In Developments in Information & Knowledge Management for Business Applications (pp. 177-202). Springer, Cham., 2021.
[13] Subramanian, Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42, 2018.
[14] Balani, Cloud computing security challenges and threats. In 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-4). IEEE, 2020.
[15] Mondal, Cloud computing security issues & challenges: A review. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-5). IEEE., 2020.
[16] Muheidat, Mobile and cloud computing security. In Machine Intelligence and Big Data Analytics for Cybersecurity Applications (pp. 461-483). Springer, Cham, 2021.