@inproceedings{fbe071fb81eb4bc8b6f8ff89237bbc03,
title = "Cloud Security Issues and Log-based Proactive Strategy",
abstract = "Recently, given the current situation the world is undergoing with the COVID-19 pandemic, a lot of companies encourage remote working from home. As a result, the use of the cloud has increased, but as a consequence, cyberattacks on the cloud systems have escalated. However, organizations and companies still have concerns about the use of the cloud as most of them remain unaware of the security threats against cloud system. This work researches through major concerns of the organizations and companies for cloud security and tries to explain why it is important for the organization to be aware of the threats that the cloud is facing. It also proposes a three-step strategy to help companies and organizations to secure their cloud system.",
keywords = "Cloud, Cloud computing, Log management, cloud security",
author = "Oumayma Mejri and Dana Yang and Inshil Doh",
note = "Funding Information: This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2020R1A2C1006497). Inshil Doh is the corresponding author. Publisher Copyright: {\textcopyright} 2022 Global IT Research Institute-GiRI.; null ; Conference date: 13-02-2022 Through 16-02-2022",
year = "2022",
doi = "10.23919/ICACT53585.2022.9728822",
language = "English",
series = "International Conference on Advanced Communication Technology, ICACT",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "392--397",
booktitle = "24th International Conference on Advanced Communication Technology",
}