Securing Cloud-Based Applications: Addressing the New Wave of Cyber Threats

Authors

  • Aryendra Dalal ERS Specialist Senior --Deloitte & Touche LLP, Email: aryendra@gmail.com Author
  • Farhana Mahjabeen Department of Applied Physics, Electronics and Communication Engineering, Islamic University Kushtia, Bangladesh, Email: farhana.aeceiu@gmail.com Author

Keywords:

cloud computing, Security threats, Security attacks

Abstract

The cloud computing boom has transformed application development, deployment and
management from the complex IT headache it used to be into something more manageable – but
not void of new security challenges. The present paper discusses the unique security problems of
cloud-based applications (data leakages, insecure interfaces and multi-tenancy risks). The report
offers an investigation of these threats and a review of the efficiency levels at which security
strategies such as encryption, identity management or network securities are working. Finally,
the paper talks about how cloud service providers should facilitate secure apps and why
delineating the duties of suppliers to customers is crucial. This paper is about the shared
responsibility model for securing cloud-based applications. It provides real-world examples and
offers practical recommendations to protect your apps from an ever-evolving threat landscape so
that they stay healthy. 

Downloads

Download data is not yet available.

Downloads

Published

2015-08-29

How to Cite

Securing Cloud-Based Applications: Addressing the New Wave of Cyber Threats. (2015). International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 6(1), 1-20. https://ijmlrcai.com/index.php/Journal/article/view/129

Most read articles by the same author(s)

Similar Articles

1-10 of 182

You may also start an advanced similarity search for this article.