Show simple item record

dc.contributor.authorUgorji, Betrand
dc.contributor.authorAbouzakhar, Nasser
dc.contributor.authorSapsford, John
dc.date.accessioned2014-03-04T15:29:01Z
dc.date.available2014-03-04T15:29:01Z
dc.date.issued2013-10-18
dc.identifier.citationUgorji , B , Abouzakhar , N & Sapsford , J 2013 , Cloud Security : A Review of Recent Threats and Solution Models . in Procs Int Conf on Cloud Security Management : ICCSM 2013 . Academic Conferences Ltd. , pp. 115-124 , Int Conf on Cloud Security Management (ICCSM 2013) , Seattle , United States , 17/10/13 .
dc.identifier.citationconference
dc.identifier.otherPURE: 2819512
dc.identifier.otherPURE UUID: 0b46ea58-b6bf-4fb9-84a0-d1ccfcf86908
dc.identifier.urihttp://hdl.handle.net/2299/12997
dc.description.abstractThe most significant barrier to the wide adoption of cloud services has been attributed to perceived cloud insecurity (Smitha, Anna and Dan, 2012). In an attempt to review this subject, this paper will explore some of the major security threats to the cloud and the security models employed in tackling them. Access control violations, message integrity violations, data leakages, inability to guarantee complete data deletion, code injection, malwares and lack of expertise in cloud technology rank the major threats. The European Union invested €3m in City University London to research into the certification of Cloud security services. This and more recent developments are significant in addressing increasing public concerns regarding the confidentiality, integrity and privacy of data held in cloud environments. Some of the current cloud security models adopted in addressing cloud security threats were – Encryption of all data at storage and during transmission. The Cisco IronPort S-Series web security appliance was among security solutions to solve cloud access control issues. 2-factor Authentication with RSA SecurID and close monitoring appeared to be the most popular solutions to authentication and access control issues in the cloud. Database Active Monitoring, File Active Monitoring, URL Filters and Data Loss Prevention were solutions for detecting and preventing unauthorised data migration into and within clouds. There is yet no guarantee for a complete deletion of data by cloud providers on client requests however; FADE may be a solution (Yang et al., 2012).en
dc.format.extent10
dc.language.isoeng
dc.publisherAcademic Conferences Ltd.
dc.relation.ispartofProcs Int Conf on Cloud Security Management
dc.rightsOpen
dc.subjectCloud Security, Security Threats, Security Solutions.
dc.titleCloud Security : A Review of Recent Threats and Solution Modelsen
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.relation.schoolSchool of Computer Science
dc.description.versiontypeFinal Accepted Version
dcterms.dateAccepted2013-10-18
rioxxterms.versionAM
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue
herts.rights.accesstypeOpen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record