A CASE STUDY ON USING THREAT MODELING TO SECURE CLOUD COMPUTING DATA
Journal: Proceedings on Engineering Sciences (Vol.6, No. 4)Publication Date: 2024-12-31
Authors : N. Praneetha S. Srinivasa Rao P. S. Brahmanandam;
Page : 1837-1848
Keywords : Cloud computing; Privacy or Security; Cloud Service Providers; Encryption Methods;
Abstract
Cloud computing (CC) is an easy way to access computer resources, which many businesses increasingly use to outsource their data. Nonetheless, privacy and security are significant concerns in CC when sharing and storing data in a distributed setting. Potential dangers to cloud data security would cause significant disruptions. This paper discusses security challenges and feasible encryption approaches. The workings of a few encryption schemes are also discussed. By identifying and mitigating potential threats, it is possible to reduce the risk of a data breach. In this connection, a case study based on threat model simulations is presented. The CC's future is bright and hopeful, albeit a few loose ends exist. Building an integrated security architecture that can regulate all cloud layers is an immediate requirement for providing highly safe cloud services. A few recommendations to protect cloud data are provided and CC's future research directions are also emphasized.
Other Latest Articles
- TEXT DESCRIPTION TO IMAGE GENERATION USING GENERATIVE ADVERSARIAL NETWORK
- DYNAMICS OF ANISOTROPIC SHARMA-MITTAL HOLOGRAPHIC DARK ENERGY MODEL IN BRANS-DICKE THEORY
- DESIGN AND IMPLEMENTATION OF AN DYNAMIC IOT CLOUD BASED PROCESSING PLATFORM
- INVESTIGATION OF ANOMALOUS IONOSPHERIC SIGNATURE AS POSSIBLE PRECURSOR TO EARTHQUAKES
- EFFECT OF COVID-19 ON PSYCHOSOCIAL BEHAVIOUR OF AUTOMOBILE WORKERS PERFORMANCE - AN ERGONOMIC STUDY
Last modified: 2024-12-09 19:18:30