Cloud Security Issues and Log-based Proactive Strategy

Oumayma Mejri, Dana Yang, Inshil Doh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Recently, given the current situation the world is undergoing with the COVID-19 pandemic, a lot of companies encourage remote working from home. As a result, the use of the cloud has increased, but as a consequence, cyberattacks on the cloud systems have escalated. However, organizations and companies still have concerns about the use of the cloud as most of them remain unaware of the security threats against cloud system. This work researches through major concerns of the organizations and companies for cloud security and tries to explain why it is important for the organization to be aware of the threats that the cloud is facing. It also proposes a three-step strategy to help companies and organizations to secure their cloud system.

Original languageEnglish
Title of host publication24th International Conference on Advanced Communication Technology
Subtitle of host publicationArtificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages392-397
Number of pages6
ISBN (Electronic)9791188428090
DOIs
StatePublished - 2022
Event24th International Conference on Advanced Communication Technology, ICACT 2022 - Virtual, Online, Korea, Republic of
Duration: 13 Feb 202216 Feb 2022

Publication series

NameInternational Conference on Advanced Communication Technology, ICACT
Volume2022-February
ISSN (Print)1738-9445

Conference

Conference24th International Conference on Advanced Communication Technology, ICACT 2022
Country/TerritoryKorea, Republic of
CityVirtual, Online
Period13/02/2216/02/22

Bibliographical note

Publisher Copyright:
© 2022 Global IT Research Institute-GiRI.

Keywords

  • Cloud
  • Cloud computing
  • Log management
  • cloud security

Fingerprint

Dive into the research topics of 'Cloud Security Issues and Log-based Proactive Strategy'. Together they form a unique fingerprint.

Cite this