ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A CASE STUDY ON USING THREAT MODELING TO SECURE CLOUD COMPUTING DATA

Journal: Proceedings on Engineering Sciences (Vol.6, No. 4)

Publication Date:

Authors : ;

Page : 1837-1848

Keywords : Cloud computing; Privacy or Security; Cloud Service Providers; Encryption Methods;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing (CC) is an easy way to access computer resources, which many businesses increasingly use to outsource their data. Nonetheless, privacy and security are significant concerns in CC when sharing and storing data in a distributed setting. Potential dangers to cloud data security would cause significant disruptions. This paper discusses security challenges and feasible encryption approaches. The workings of a few encryption schemes are also discussed. By identifying and mitigating potential threats, it is possible to reduce the risk of a data breach. In this connection, a case study based on threat model simulations is presented. The CC's future is bright and hopeful, albeit a few loose ends exist. Building an integrated security architecture that can regulate all cloud layers is an immediate requirement for providing highly safe cloud services. A few recommendations to protect cloud data are provided and CC's future research directions are also emphasized.

Last modified: 2024-12-09 19:18:30