New Age Cyber Threat Mitigation for Cloud Computing Networks

Review of Solutions for Securing End-User Data Over Cloud Applications

Author(s): Akashdeep Bhardwaj * .

Pp: 70-83 (14)

DOI: 10.2174/9789815136111123010008

* (Excluding Mailing and Handling)

Abstract

With more and more organizations working on the cloud over unsecured internet, sharing files and emails and saving them on cloud storage is imperative. Securing the end-user sensitive data in transit has thus started to get maximum priority to protect it from Cloud company staff, hackers, and data thieves. In this study, an attempt is made to review the research on end-user data security. There is an urgent need for solutions for end-users data protection privacy during the times when migrating from one cloud service provider to another. This chapter reviews the challenges in Cloud computing services regarding end-user data, analyzes the issues face, and presents solutions to overcome them. The chapter identifies end-users data security issues when using cloud computing services. The focus is directed to critical issues related to unauthorized access to integrity during data in transit. This can be addressed using Public Key Cryptography or PKI. For Confidentiality and Data Integrity for end-user data over Cloud. Then for migrating from one cloud service provider to another, data security and privacy are addressed by Cloud-aware applications. Lastly, using Multi-Factor Authentication combined with network and application detection systems, Intrusion Detection Systems, and Network traffic routing in case of cyber-attacks can help achieve denial of service attack mitigation or prevent man-in-the-middle and network snooping in Cloud Computing.


Keywords: Cloud Computing, Cloud Security, CSP, PKI, Public Key Cryptography, IDS, Firewall.

Related Journals
Related Books
© 2024 Bentham Science Publishers | Privacy Policy