Managing User and Cloud Service Provider Access to Data in Cloud Computing- Panacea for Data Vulnerability
Author(s):
Uchechukwu Paschal Emejeamara, Udochukwu J. Nwoduh, Andrew K. Madu
Keywords:
Cloud computing, security risks, data threats, cloud servers, user management.
Abstract
The cloud computing technology allows organizations and individuals to share infrastructure, which reduces the cost of conducting business operations. The large number of security threats associated with cloud computing discourages some organizations and individuals from adopting this technology. The key types of security risks can be put into three categories, including network-related, data, and cloud environment threats. The cloud environment threats include denial of service and account hijacking. Data threats include the loss or breach of critical information. The network-related sources of threat include malicious insiders, abuse of cloud services, and insecure interface APIs. Segregation of duties and effective recruitment procedures are some of the key strategies that should be used to manage administrators’ access to data. The users’ access to the data can be managed through the application of configuration management tools, manual control of servers, enterprise-identity solution, exposure of AD and LDAP to the internet, and directory-as-a-service.
Article Details
Unique Paper ID: 144540

Publication Volume & Issue: Volume 3, Issue 12

Page(s): 224 - 228
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews