ارائه جدیدترین طبقه‌بندی مسائل امنیتی رایانش ابری : چالش‌ها، حمله‌ها، راه‌حل‌ها

نوع مقاله : ترویجی

نویسندگان

1 دانشجوی کارشناسی ارشد دانشکده هوش مصنوعی وعلوم شناختی، دانشگاه جامع امام حسین (ع)، ایران، تهران

2 استادیار دانشکده کامپیوتر دانشگاه جامع امام حسین (ع)، ایران، تهران

چکیده

رایانش ابری با ظهور خود انقلابی در خدمات‌دهی اینترنت به وجود آورده است. در رایانش ابری  مسئله امنیت مهم‌ترین هدف و نیاز اصلی یک سیستم  می‌باشد. با توسعه رایانش ابری، مجموعه‌ای از مشکلات امنیتی ظاهر شده است. وجود مسائل امنیتی مانعی قوی برای سازگاری کاربران با سیستم‌های رایانش ابری است. امنیت ابری در حال تبدیل شدن به یک تمایز کلیدی و مزیت رقابتی بین ارائه دهندگان ابر است. این مقاله برخی از سیستم‌های رایانش ابری را معرفی می‌کند و مشکل امنیت رایانش ابری و راهبرد آن را با توجه به مفاهیم و نمادهای رایانش ابری تحلیل می‌کند، سعی شده است این مقاله نگاهی جامع به امنیت رایانش ابری داشته باشد و مسائل مربوط به امنیت رایانش ابری و برخی از چالش‌های تحقیقاتی کلیدی پیاده‌سازی راه‌حل‌های امنیتی ابری بررسی شده است. در این مقاله به جدیدترین و مهم‌ترین مسائل امنیتی ابر مانند امنیت داده، محرمانگی داده، امنیت برنامه و چالش‌ها، حمله‌ها و راه‌حل‌های مقابله با آن‌ها با توسعه رایانش ابری پرداخته شده است. در انتها مسائل امنیتی خاص ابر شامل هویت اعتبار دسترسی، توسعه نرم‌افزار ناامن، منابع شخص ثالث ناامن مورد بررسی قرار گرفت.

کلیدواژه‌ها


عنوان مقاله [English]

The Latest Classification of Cloud Computing Security Issues: Challenges, Attacks and Solutions

نویسندگان [English]

  • sajjad Gavidel 1
  • Mahdi naghavi 2
  • davood asgharzadeh 1
1 Department of Information Technology, Faculty of Artificial Intelligence and Cognitive Sciences, Imam Hossein University (AS), Tehran
2 Assistant Professor, Computer Faculty, Imam Hossein University (AS)
چکیده [English]

cloud computing has revolutionized internet service with its advent. in cloud computing, security is the most important goal and the main requirement of a system. as cloud computing develops, a set of security problems appears. security problems are a strong obstacle to the adaptation of users to cloud computing systems. cloud security is becoming a key distinction and competitive advantage between cloud providers. this paper presents some cloud computing systems and analyzes the problem of cloud computing and its strategy with regard to the concepts and features of cloud computing. this paper tries to provide a comprehensive overview of cloud computing security and some of the key research challenges of cloud computing security. in this paper, the latest and most important cloud security issues such as data security, data secrecy, program security and challenges, attacks and solutions to deal with them with the development of cloud computing have been discussed. in the end, special security issues including the identity of access credit, development of insecure software, and third- party sources were investigated.

کلیدواژه‌ها [English]

  • Cloud Computing
  • Cloud Computing Security
  • Cloud Computing Challeng
  • Countering Attacks on Cloud Comp

Smiley face

[1]  A. Bahadur and A. Sadeghi, "Security in cloud computing based on network security based on intelligent methods," Applied Science Studies in Engineering, pp. 65-74, 2019.
[2]  N. Mansoori and B. Mohammad Hassanizadeh, and R. Ghafari "Security-based work scheduling algorithm using particle swarm optimization technique and multiple adaptive learning to improve security in cloud computing environment" Electronic and Cyber Defense 159-178 pp, 2019.
 [3] J. Michael Brook,  A . Stone Getsin, and M. Roza, “Top Threats to Cloud Computing”2022
 [4]I. Kanwal, H. Shafi, S. Memon, and M. H. Shah, "Cloud computing security challenges: A review," in Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, pp. 459-469, Springer, January 2021.
[5]A. G. Prabhu, A. Narayanan, and C. Kurian, "A Study on Security ISSUES in SaaS Cloud Computing," 2021.
[6] H. P. Singh, R. Singh, and V. Singh, "Cloud computing security issues, challenges and solutions," Easy Chair, pp.      2516-2314, 2020.
[7] A. Kumar and K. A. Kumar, "A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review," International Journal of Human Computations & Intelligence, vol. 1, no. 3, pp. 13-18, 2022.
[8] N. B. Muhammad and M. Bazzi, "Advances in Cloud Computing: Security Issues and Challenges in the Cloud," in 2022 5th International Conference on Information and Computer Technologies (ICICT), 2022: IEEE, pp. 110-116.
[9] A. H. Shaikh and B. Meshram, "Security issues in cloud computing," in Intelligent Computing and Networking: Proceedings of IC-ICN 2020, Springer, pp. 63-77, 2021.
[10] I. Indu, P. R. Anand, and V. Bhaskar, "Identity and access management in cloud environment: Mechanisms and challenges," Engineering science and technology, an international journal, vol. 21, no. 4, pp. 574-588, 2018.
[11] A. Sunyaev and A. Sunyaev, "Cloud computing," Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies, pp. 195-236, 2020.
[12] v. Shahi and M. Naqvi, "Investigation and evaluation of new models of data security in cloud computing," Non-functional Defense Quarterly, vol. 8, no. 2, pp. 35-42, 2017.
[13] K. Abbas, "DDoS Survey and Arrangements," 2019.
[14] P. Kumar, "Cloud computing: threats, attacks and solutions," International Journal of Emerging Technologies in Engineering Research (IJETER), vol. 4, no. 8, pp. 24-28, 2016.
[15] D. Stiawan, M. E. Suryani, M. Y. Idris, M. N. Aldalaien, N. Alsharif, and R. Budiarto, "Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network," IEEE Access, vol. 9, pp. 116475-116484, 2021.
پایگاه­های اینترنتی:
[16] A Comprehensive Guide to Cloud Security in 2023 (Risks, Best Practices, Certifications) Edward Jones, October 28, 2022.
[17] Cloud Computing Security Issues https://www.skyhighsecurity.com/en-us/cybersecurity-defined/cloud-computing-security-issues                                 [18] Gartner Security and Risk Management Summit                 https://www.gartner.com/en/conferences/emea/security-risk-management-uae/featured-topics/cloud-security
[19] What is a cloud firewall? What is firewall-as-a-service (FWaaS)? https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/