Cloud Threat Defense: A Comprehensive Security Solution for ITC595
VerifiedAdded on  2025/05/03
|4
|2131
|350
AI Summary
Desklib offers solved assignments and past papers to help students succeed.

ITC595 Research Project (Cloud Threat Defense – A Threat Protection and Security Compliance
Solution
)
Deepak R Bharadwaj ; Anamika Bhattacharya ; Manivannan Chakkaravarthy
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT –
Cloud Security Alliance (CSA) says that the
cloud maintains 70% of the business over
worldwide. just any other technology adaptation
cloud technology also opens some security
issues. hence this paper helps to understand
the cloud technology and helps to explore the
cloud-related issues and some native technology
to explore it more explicitly and to find
solutions. the paper helps to find some new
computing processes helps to find entire
challenges related to the cloud. helps to
provide some dynamic cloud atmosphere and to
get some practical solution to solve the
upcoming challenges by which cloud provider and
the user can secure their sensitive or
confidential data/ information with high
authentication technique such two steps or
three-step authentication technique to store
data more securely.
Keywords— Servers, Organizations, Computer
architecture, Firewalls (computing), Cloud
computing security
INTRODUCTION
cloud computing is based on information
technology model that delivers ascendible.
climbable on-demand computation service by
which user can access their data or information
remotely by the help of internet facility and
it helps to store data, software, and network
also can be accessed by the user. in current
days most of the organization use cloud
services to store their data over the cloud-
based database. they are using it as one of the
most common resources for storage. the
usability of the cloud service grows in future
very hard. according to Gartner's prediction,
the cloud service will occupy 92% of the
information technology until 2020. till that
time any related organization turns his entire
business into the cloud the security factors
are must be recalculated by the organizer.
along with there must be some new security
strategies made to secure their websites and
application's data. by the help of cloud the
workload and the data can be stored over the
cloud.[3]
A. Research Problem
the proposed research paper has a lot of
security issue while storing the data over the
cloud.
ï‚· data breaches: in the data breach the
data can be theft by some unauthorized
person. he can be theft entire type of
information such as that could be
confidential and sensitive data of the
user. the data breach is a divide in
two parts first is personal health
information (PHI) and the second one
is personally[1]. identifiable
information (PSI) which must be taken
as more intellectua[6].
ï‚· Insecure Interfaces and APIs: the
related and over which the cloud
service had been run that interface
and the related API must be secured by
the network engineer because the
unsecured API is the most tempting
source for the attackers[10].
ï‚· System Vulnerabilities: there can be
some system error also available by
which we can because of some data leak
and there can be theft by the
hijackers[6].
ï‚· Account Hijacking: the related user
account can be hijacked by the
Malicious attackers. it can be done by
the help of phishing pages and spam
emails. by which the attacker could
get access to the user.
ï‚· Advanced Persistence Threats:
Persistence threats are continuous and
some hidden process of hacking the
data by targeting some specific
computer and system. these tasks are
performed by continuous time.
ï‚· data loss: data can be lost by
hijacking the session and performing
the DDoS attacks and from insured
APIs[9].
ï‚· Denial of Service: the cloud-based
service can be denials to run such
type of service whichever are service
dependent.
ï‚· Shared Technology Vulnerabilities:
while using its native technology
sometimes the relatable technology
also denied to run such kind of
service over its platform. hence such
kind of Vulnerabilities will because
of shared technology[8].
ï‚· Insufficient due diligence: by the
help of cloud computing it becomes
very hard to manage any relatable
organization by implementing some new
technologies. there is become a
knowledge gap which it for the
prevention from sufficient experiments
while hiring a new cloud service
provider[4].
B. Research Justification
there various ways to treat the traditional
workload which tends to a long livable security
solution. with a large amount of data is the
best way to secure the data. while such type
facility for a large amount of data there is an
immutable and previously installed data is
available. there is a lot of ways to approach
the highly secured cloud service. the solution
can be got by using the two different cloud
services such as zero trust and immutable
servers:
ï‚· immutable servers: this is of the
best way to achieve a secured
Solution
)
Deepak R Bharadwaj ; Anamika Bhattacharya ; Manivannan Chakkaravarthy
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT –
Cloud Security Alliance (CSA) says that the
cloud maintains 70% of the business over
worldwide. just any other technology adaptation
cloud technology also opens some security
issues. hence this paper helps to understand
the cloud technology and helps to explore the
cloud-related issues and some native technology
to explore it more explicitly and to find
solutions. the paper helps to find some new
computing processes helps to find entire
challenges related to the cloud. helps to
provide some dynamic cloud atmosphere and to
get some practical solution to solve the
upcoming challenges by which cloud provider and
the user can secure their sensitive or
confidential data/ information with high
authentication technique such two steps or
three-step authentication technique to store
data more securely.
Keywords— Servers, Organizations, Computer
architecture, Firewalls (computing), Cloud
computing security
INTRODUCTION
cloud computing is based on information
technology model that delivers ascendible.
climbable on-demand computation service by
which user can access their data or information
remotely by the help of internet facility and
it helps to store data, software, and network
also can be accessed by the user. in current
days most of the organization use cloud
services to store their data over the cloud-
based database. they are using it as one of the
most common resources for storage. the
usability of the cloud service grows in future
very hard. according to Gartner's prediction,
the cloud service will occupy 92% of the
information technology until 2020. till that
time any related organization turns his entire
business into the cloud the security factors
are must be recalculated by the organizer.
along with there must be some new security
strategies made to secure their websites and
application's data. by the help of cloud the
workload and the data can be stored over the
cloud.[3]
A. Research Problem
the proposed research paper has a lot of
security issue while storing the data over the
cloud.
ï‚· data breaches: in the data breach the
data can be theft by some unauthorized
person. he can be theft entire type of
information such as that could be
confidential and sensitive data of the
user. the data breach is a divide in
two parts first is personal health
information (PHI) and the second one
is personally[1]. identifiable
information (PSI) which must be taken
as more intellectua[6].
ï‚· Insecure Interfaces and APIs: the
related and over which the cloud
service had been run that interface
and the related API must be secured by
the network engineer because the
unsecured API is the most tempting
source for the attackers[10].
ï‚· System Vulnerabilities: there can be
some system error also available by
which we can because of some data leak
and there can be theft by the
hijackers[6].
ï‚· Account Hijacking: the related user
account can be hijacked by the
Malicious attackers. it can be done by
the help of phishing pages and spam
emails. by which the attacker could
get access to the user.
ï‚· Advanced Persistence Threats:
Persistence threats are continuous and
some hidden process of hacking the
data by targeting some specific
computer and system. these tasks are
performed by continuous time.
ï‚· data loss: data can be lost by
hijacking the session and performing
the DDoS attacks and from insured
APIs[9].
ï‚· Denial of Service: the cloud-based
service can be denials to run such
type of service whichever are service
dependent.
ï‚· Shared Technology Vulnerabilities:
while using its native technology
sometimes the relatable technology
also denied to run such kind of
service over its platform. hence such
kind of Vulnerabilities will because
of shared technology[8].
ï‚· Insufficient due diligence: by the
help of cloud computing it becomes
very hard to manage any relatable
organization by implementing some new
technologies. there is become a
knowledge gap which it for the
prevention from sufficient experiments
while hiring a new cloud service
provider[4].
B. Research Justification
there various ways to treat the traditional
workload which tends to a long livable security
solution. with a large amount of data is the
best way to secure the data. while such type
facility for a large amount of data there is an
immutable and previously installed data is
available. there is a lot of ways to approach
the highly secured cloud service. the solution
can be got by using the two different cloud
services such as zero trust and immutable
servers:
ï‚· immutable servers: this is of the
best way to achieve a secured
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

solution. it just lies a remedy for a
good server. its best benefit is that
while using this concept there is no
need to need to change the existing
server while suffering any such type
of attacks. to deal with such issue
there can be new and pre-defined
security parameters will be defined
once again. while doing this it
minimizes entire threats and
challenges for the better
configuration and for the better
reliability in existing server[5].
ï‚· zero thrusts: the proposed research
paper helps in for analysis of the
configuration, endpoint log, network
access log, user access log to get
such ability to ensure the Zero
thrust method for cloud security.
with help of immutable server for
more secure cloud servers, there can
become extra steps can be taken by
the user to configure and check the
workload over a server, by such
secured server user can get some
secured application and least
privileges, and it defines a new
acceptable a range of pattern.
the above-proposed solution helps to
understand provide a new deviation
form by some preconfigured policies
hence the user can compliance without
making any further decision, which
helps in for remediating
configuration such as network
isolation. it helps in for
termination privileges of application
resource[8].
LITERATURE REVIEW
C. Figures and Tables
Figure 1. Cloud threat defense - architecture
according to figure 1. while preparing the
solution there various data collection sources
such user-accessible data, endpoint auth,
NetFlow data collection, container log,
syslogs, container logs, and security vendor
log which are related to some more network
segment contexts that cloud be cloud or image
tags to get the predefined solution.
the logs can be continuously analyzed by the
backend analyze services of detection for the
detection of some other anomalous activities
and it helps to get some actions for
remediation[5].
Figure 2. Cloud threat defense - security model
in figure 2. there are four model have shown
cloud threat reduction:
1. discover assets: the defense of the
cloud threat helps in for detection of
workload over the cloud, network logs,
etc. to get antimalware protection
over to get end-to-end point security
solution. it includes some native
technologies such as CloudWatch, VPS,
AWS which helps in for machine
learning and to reduce the data leak.
2. assess security posture: it helps in
for an assessment of cloud workload
and provides some firewall for higher
security to deal with network
segments. it helps to deal with
vulnerabilities of the network.
3. identify the security threat: by
merging the machine learning and
analysis of data cloud security can be
defended. it helps in to reduce risk
factors while tracking the threats and
to find security gaps. it also helps
in to approach the mitigation to solve
similar security issues.
4. remediate security issues: the defense
of cloud threat provide some
corrective actions to amend a new
definition to identify issues and
resolve it by providing some auto-
corrections mechanism compromised
resource of isolation and helps in to
get end-to-end security. also, it
autocorrects the firewall setting
whichever is unsecured[3].
good server. its best benefit is that
while using this concept there is no
need to need to change the existing
server while suffering any such type
of attacks. to deal with such issue
there can be new and pre-defined
security parameters will be defined
once again. while doing this it
minimizes entire threats and
challenges for the better
configuration and for the better
reliability in existing server[5].
ï‚· zero thrusts: the proposed research
paper helps in for analysis of the
configuration, endpoint log, network
access log, user access log to get
such ability to ensure the Zero
thrust method for cloud security.
with help of immutable server for
more secure cloud servers, there can
become extra steps can be taken by
the user to configure and check the
workload over a server, by such
secured server user can get some
secured application and least
privileges, and it defines a new
acceptable a range of pattern.
the above-proposed solution helps to
understand provide a new deviation
form by some preconfigured policies
hence the user can compliance without
making any further decision, which
helps in for remediating
configuration such as network
isolation. it helps in for
termination privileges of application
resource[8].
LITERATURE REVIEW
C. Figures and Tables
Figure 1. Cloud threat defense - architecture
according to figure 1. while preparing the
solution there various data collection sources
such user-accessible data, endpoint auth,
NetFlow data collection, container log,
syslogs, container logs, and security vendor
log which are related to some more network
segment contexts that cloud be cloud or image
tags to get the predefined solution.
the logs can be continuously analyzed by the
backend analyze services of detection for the
detection of some other anomalous activities
and it helps to get some actions for
remediation[5].
Figure 2. Cloud threat defense - security model
in figure 2. there are four model have shown
cloud threat reduction:
1. discover assets: the defense of the
cloud threat helps in for detection of
workload over the cloud, network logs,
etc. to get antimalware protection
over to get end-to-end point security
solution. it includes some native
technologies such as CloudWatch, VPS,
AWS which helps in for machine
learning and to reduce the data leak.
2. assess security posture: it helps in
for an assessment of cloud workload
and provides some firewall for higher
security to deal with network
segments. it helps to deal with
vulnerabilities of the network.
3. identify the security threat: by
merging the machine learning and
analysis of data cloud security can be
defended. it helps in to reduce risk
factors while tracking the threats and
to find security gaps. it also helps
in to approach the mitigation to solve
similar security issues.
4. remediate security issues: the defense
of cloud threat provide some
corrective actions to amend a new
definition to identify issues and
resolve it by providing some auto-
corrections mechanism compromised
resource of isolation and helps in to
get end-to-end security. also, it
autocorrects the firewall setting
whichever is unsecured[3].

Figure 3. Cloud workload protection controls
hierarchy
the above-shown research paper helps to
understand the architecture and some different
approaches to providing higher level security.
which works more accurately over detection
based solution on behalf of preventing the form
of security threats. such that it is very easy
to compromise with the server and fix them.
the hierarchy is segregated in 3 sections-
ï‚· optional server protection strategies:
the can be secured by recommending the
user to not to secure any sensitive or
confidential data over cloud because
are always some threats with cloud
security. user/client must be read the
user and cloud agreements while signup
and choosing the plan for related
service. hence the user can deal the
insufficient information. user must
create a harder password which can't
be predictable to hackers and
malicious attacks. according to a
study, 90% of the password can be
cracked within a minute. hence the
user password must be highly secured
by containing an upper case letter, a
special character, and lower case
letter. the encryption technique is
also is a very good option to store
data over cloud because while
performing the encryption the data
will be transformed into a new form
which helps to protect data from
cipher attacks. the easiest technique
to encrypt the data: convert the
entire data into a zip file and make
it password protected[10].
ï‚· CWPP: its full name is cloud workload
protection platform. the CWPP term was
introduced by the Gartner for a very
emerging technology which is cloud
computing. at initial days CWPP was
only used over secure servers to
reduce their workload of public cloud
such as Infrastructure as a service
(IAAS). it is very able to perform
some actions for vendor platform but
it include the entire function to
manage cloud vulnerability, it helps
to define some segmentation related to
the host along with it helps in for
customer whitelisting.
ï‚· core server protection strategies:
there are many features and strategies
are available to protect cloud
database server. there are much-
sophisticated security mechanisms by
applying them the user can secure
their data over the cloud. there is
another threat is also available which
is proliferating very highly. the
related malware name is ransomware.
such cyber attack affects user system
directly. while attacking over any
system the Ransomeware transform the
entire data into the encrypted form of
related computer or system and to
provide the access to the user or
decrypt it takes some charges. the
payment can be made by the only
bitcoins, which is a type of digital
currency. such malware attacks become
a bad headache for the entire globe
because in last year 13 percent of
systems had faced such attack
globally. to prevent from such malware
attacks user can apply some good
quality antivirus on his computer.
along the cloud service provider must
be trustable. user has to reduce the
uses of a public network such as
public WiFi etc[1].
One figure and one table can be included in
your short paper.
CONCLUSION
nowadays cloud service also forms one of the
most usable technology. the cloud carries many
benefits with itself for huge organizations and
companies. along with the cloud have various
benefits such as on-demand service, service
selection according to client need, pay only
for that what you have used.
the above-shown research shows many security
issues and threats. there is some vulnerability
of the cloud server which creates issues while
adopting the cloud service by the uses. along
with in this research paper, various cloud
services are also explored. the cloud services
always need a highly secured network channel
and password authentic service. the cloud
technology helps in to provide higher
visualization, resource pooling and etc.
ACKNOWLEDGMENT
the author is very thankful to the entire
anonymous reviews and the provided comments by
them. along with they have provided some good
suggestion for enhancement of the quality of
the proposed paper.
REFERENCES
[1] Singh, S., Jeong, Y. S., & Park, J. H.
(2016). A survey on cloud computing security:
Issues, threats, and solutions. Journal of
Network and Computer Applications, 75, 200-222.
hierarchy
the above-shown research paper helps to
understand the architecture and some different
approaches to providing higher level security.
which works more accurately over detection
based solution on behalf of preventing the form
of security threats. such that it is very easy
to compromise with the server and fix them.
the hierarchy is segregated in 3 sections-
ï‚· optional server protection strategies:
the can be secured by recommending the
user to not to secure any sensitive or
confidential data over cloud because
are always some threats with cloud
security. user/client must be read the
user and cloud agreements while signup
and choosing the plan for related
service. hence the user can deal the
insufficient information. user must
create a harder password which can't
be predictable to hackers and
malicious attacks. according to a
study, 90% of the password can be
cracked within a minute. hence the
user password must be highly secured
by containing an upper case letter, a
special character, and lower case
letter. the encryption technique is
also is a very good option to store
data over cloud because while
performing the encryption the data
will be transformed into a new form
which helps to protect data from
cipher attacks. the easiest technique
to encrypt the data: convert the
entire data into a zip file and make
it password protected[10].
ï‚· CWPP: its full name is cloud workload
protection platform. the CWPP term was
introduced by the Gartner for a very
emerging technology which is cloud
computing. at initial days CWPP was
only used over secure servers to
reduce their workload of public cloud
such as Infrastructure as a service
(IAAS). it is very able to perform
some actions for vendor platform but
it include the entire function to
manage cloud vulnerability, it helps
to define some segmentation related to
the host along with it helps in for
customer whitelisting.
ï‚· core server protection strategies:
there are many features and strategies
are available to protect cloud
database server. there are much-
sophisticated security mechanisms by
applying them the user can secure
their data over the cloud. there is
another threat is also available which
is proliferating very highly. the
related malware name is ransomware.
such cyber attack affects user system
directly. while attacking over any
system the Ransomeware transform the
entire data into the encrypted form of
related computer or system and to
provide the access to the user or
decrypt it takes some charges. the
payment can be made by the only
bitcoins, which is a type of digital
currency. such malware attacks become
a bad headache for the entire globe
because in last year 13 percent of
systems had faced such attack
globally. to prevent from such malware
attacks user can apply some good
quality antivirus on his computer.
along the cloud service provider must
be trustable. user has to reduce the
uses of a public network such as
public WiFi etc[1].
One figure and one table can be included in
your short paper.
CONCLUSION
nowadays cloud service also forms one of the
most usable technology. the cloud carries many
benefits with itself for huge organizations and
companies. along with the cloud have various
benefits such as on-demand service, service
selection according to client need, pay only
for that what you have used.
the above-shown research shows many security
issues and threats. there is some vulnerability
of the cloud server which creates issues while
adopting the cloud service by the uses. along
with in this research paper, various cloud
services are also explored. the cloud services
always need a highly secured network channel
and password authentic service. the cloud
technology helps in to provide higher
visualization, resource pooling and etc.
ACKNOWLEDGMENT
the author is very thankful to the entire
anonymous reviews and the provided comments by
them. along with they have provided some good
suggestion for enhancement of the quality of
the proposed paper.
REFERENCES
[1] Singh, S., Jeong, Y. S., & Park, J. H.
(2016). A survey on cloud computing security:
Issues, threats, and solutions. Journal of
Network and Computer Applications, 75, 200-222.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

[2] Fernandez, E. B., Monge, R., & Hashizume,
K. (2016). Building a security reference
architecture for cloud systems. Requirements
Engineering, 21(2), 225-249.
[3] Coppolino, L., D’Antonio, S., Mazzeo, G.,
& Romano, L. (2017). Cloud security: Emerging
threats and current solutions. Computers &
Electrical Engineering, 59, 126-140.
[4] Hussein, N. H., & Khalid, A. (2016). A
survey of cloud computing security challenges
and solutions. International Journal of
Computer Science and Information
Security, 14(1), 52.
[5] Kar, J., & Mishra, M. R. (2016). Mitigate
threats and security metrics in cloud
computing. J Inf Process Syst, 12(2), 226-233.
[6] Iqbal, S., Kiah, M. L. M., Dhaghighi, B.,
Hussain, M., Khan, S., Khan, M. K., & Choo, K.
K. R. (2016). On cloud security attacks: A
taxonomy and intrusion detection and prevention
as a service. Journal of Network and Computer
Applications, 74, 98-120.
[7] Chang, V., Kuo, Y. H., & Ramachandran, M.
(2016). Cloud computing adoption framework: A
security framework for business clouds. Future
Generation Computer Systems, 57, 24-41.
[8] Kazim, M., & Zhu, S. Y. (2015). A survey
on top security threats in cloud computing.
K. (2016). Building a security reference
architecture for cloud systems. Requirements
Engineering, 21(2), 225-249.
[3] Coppolino, L., D’Antonio, S., Mazzeo, G.,
& Romano, L. (2017). Cloud security: Emerging
threats and current solutions. Computers &
Electrical Engineering, 59, 126-140.
[4] Hussein, N. H., & Khalid, A. (2016). A
survey of cloud computing security challenges
and solutions. International Journal of
Computer Science and Information
Security, 14(1), 52.
[5] Kar, J., & Mishra, M. R. (2016). Mitigate
threats and security metrics in cloud
computing. J Inf Process Syst, 12(2), 226-233.
[6] Iqbal, S., Kiah, M. L. M., Dhaghighi, B.,
Hussain, M., Khan, S., Khan, M. K., & Choo, K.
K. R. (2016). On cloud security attacks: A
taxonomy and intrusion detection and prevention
as a service. Journal of Network and Computer
Applications, 74, 98-120.
[7] Chang, V., Kuo, Y. H., & Ramachandran, M.
(2016). Cloud computing adoption framework: A
security framework for business clouds. Future
Generation Computer Systems, 57, 24-41.
[8] Kazim, M., & Zhu, S. Y. (2015). A survey
on top security threats in cloud computing.
1 out of 4
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.