Recently, given the current situation the world is undergoing with the COVID-19 pandemic, a lot of companies encourage remote working from home. As a result, the use of the cloud has increased, but as a consequence, cyberattacks on the cloud systems have escalated. However, organizations and companies still have concerns about the use of the cloud as most of them remain unaware of the security threats against cloud system. This work researches through major concerns of the organizations and companies for cloud security and tries to explain why it is important for the organization to be aware of the threats that the cloud is facing. It also proposes a three-step strategy to help companies and organizations to secure their cloud system.
|Title of host publication||24th International Conference on Advanced Communication Technology|
|Subtitle of host publication||Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings|
|Publisher||Institute of Electrical and Electronics Engineers Inc.|
|Number of pages||6|
|State||Published - 2022|
|Event||24th International Conference on Advanced Communication Technology, ICACT 2022 - Virtual, Online, Korea, Republic of|
Duration: 13 Feb 2022 → 16 Feb 2022
|Name||International Conference on Advanced Communication Technology, ICACT|
|Conference||24th International Conference on Advanced Communication Technology, ICACT 2022|
|Country/Territory||Korea, Republic of|
|Period||13/02/22 → 16/02/22|
Bibliographical noteFunding Information:
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2020R1A2C1006497). Inshil Doh is the corresponding author.
© 2022 Global IT Research Institute-GiRI.
- Cloud computing
- Log management
- cloud security