Comparison of Cloud Computing Security
Threats and Their Counter Measures
Shourya Rohilla
(&)
and Rejo Mathew
Department of Information Technology, NMIMS (Deemed-to-be) University,
Mumbai, India
shouryarohilla10@gmail.com, rejo.mathew@nmims.edu
Abstract. One of the major driving forces in the current technological world, is
the concept of cloud computing. Many companies and organizations have their
precious data stored on various cloud computing platforms. Organizations
depend on cloud computing will effectively manage the excessive data quantity
and handle them. In such a scenario, a breach of that data or any major threat can
cause huge damage to the image and financial position of the company. Due to a
security breach, if all of those data is leaked to an unauthorized intruder, it can
lead to severe manipulations of that data and cause huge losses to the assets of
the company. Hence, various counter measures to tackle those security issues
are discussed in this paper. All the possible data issues are listed out and the
various methods to counter them are discussed.
Keywords: Cloud computing Á Confidentiality Á Integrity Á Availability Á
Authentication Á Intrusion Detection Systems
1 Introduction
Cloud computing comes out as one of the fastest growing technologies in the world of
data storage and management [1]. Even after being highly successful and effective in its
purpose, cloud computing technology has various security threats and issues. These
threats include data loss, data leakage to a third party, network threats [2], etc. Various
methods and solutions are discussed to tackle those issues in this paper.
Cloud computing challenges are usually related to the protection of the CIA triad
[1]. Any harm to any of the component of the CIA triad can lead to hampering of its
business. Moreover, maintaining CIA is more dif ficult in cloud computing because of
its architectural pattern that allows customers to share computing resources in a private
or public cloud and also the nature of the infrastructure which is usually distributed [1].
The paper is organized in the following sections. Section 1 gives the brief intro-
duction about the paper and the issues and solutions it is going to tackle. Section 2
discusses about the problems or methods that are described in the papers that pose a
challenge to cloud computing. Section 3 discusses about the various solutions/counter
measures to those problems. Section 4 is the analysis/review table that discusses or
compares the features of the six solutions. Section 5 concludes the paper with the
conclusion write up and the corresponding future work.
© Springer Nature Switzerland AG 2020
A. P. Pandian et al. (Eds.): ICCBI 2019, LNDECT 49, pp. 224–231, 2020.
https://doi.org/10.1007/978-3-030-43192-1_25