Cloud Security Issues and Log-based Proactive Strategy

Oumayma Mejri, Dana Yang, Inshil Doh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Recently, given the current situation the world is undergoing with the COVID-19 pandemic, a lot of companies encourage remote working from home. As a result, the use of the cloud has increased, but as a consequence, cyberattacks on the cloud systems have escalated. However, organizations and companies still have concerns about the use of the cloud as most of them remain unaware of the security threats against cloud system. This work researches through major concerns of the organizations and companies for cloud security and tries to explain why it is important for the organization to be aware of the threats that the cloud is facing. It also proposes a three-step strategy to help companies and organizations to secure their cloud system.

Original languageEnglish
Title of host publication23rd International Conference on Advanced Communication Technology
Subtitle of host publicationOn-Line Security in Pandemic Era!, ICACT 2021 - Proceeding
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages392-397
Number of pages6
ISBN (Electronic)9791188428069
DOIs
StatePublished - 7 Feb 2021
Event23rd International Conference on Advanced Communication Technology, ICACT 2021 - Virtual, PyeongChang, Korea, Republic of
Duration: 7 Feb 202110 Feb 2021

Publication series

NameInternational Conference on Advanced Communication Technology, ICACT
Volume2021-February
ISSN (Print)1738-9445

Conference

Conference23rd International Conference on Advanced Communication Technology, ICACT 2021
Country/TerritoryKorea, Republic of
CityVirtual, PyeongChang
Period7/02/2110/02/21

Bibliographical note

Publisher Copyright:
© 2021 Global IT Research Institute (GiRI).

Keywords

  • Cloud
  • Cloud computing
  • cloud security
  • Log management

Fingerprint

Dive into the research topics of 'Cloud Security Issues and Log-based Proactive Strategy'. Together they form a unique fingerprint.

Cite this