Managing User and Cloud Service Provider Access to Data in Cloud Computing- Panacea for Data Vulnerability
Author(s):
Uchechukwu Paschal Emejeamara, Udochukwu J. Nwoduh, Andrew K. Madu
Keywords:
Cloud computing, security risks, data threats, cloud servers, user management.
Abstract
The cloud computing technology allows organizations and individuals to share infrastructure, which reduces the cost of conducting business operations. The large number of security threats associated with cloud computing discourages some organizations and individuals from adopting this technology. The key types of security risks can be put into three categories, including network-related, data, and cloud environment threats. The cloud environment threats include denial of service and account hijacking. Data threats include the loss or breach of critical information. The network-related sources of threat include malicious insiders, abuse of cloud services, and insecure interface APIs. Segregation of duties and effective recruitment procedures are some of the key strategies that should be used to manage administrators’ access to data. The users’ access to the data can be managed through the application of configuration management tools, manual control of servers, enterprise-identity solution, exposure of AD and LDAP to the internet, and directory-as-a-service.
Article Details
Unique Paper ID: 144540
Publication Volume & Issue: Volume 3, Issue 12
Page(s): 224 - 228
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024