Abstract
With the convenience of Cloud computing (CC) comes changes and challenges to cybersecurity. Organisational networks have changed, and the traditional perimeter-style defence is ineffective in CC architecture. Tracking the location of data processes within CC poses challenges to organisations to preserve data privacy (Sun, IEEE Access 7:147420–147452, 2019). Zero trust (ZT) architecture offers a way to use familiar network, cyber, and software security tools in a purpose-fit way to protect data in the Cloud. Probability-based authentication (PBA) uses more identifiers about user entities such as device, location, and activity to help identify bad actors and restrict access (Wiefling S, Lo Iacono L, Dürmuth M, Is this really you? An empirical study on risk-based authentication applied in the wild. In: ICT systems security and privacy protection, Cham, pp 134–148, 2019). This chapter provides an overview of how to apply security and preserve data privacy in the Cloud.
Original language | English |
---|---|
Title of host publication | Emerging Trends in Cybersecurity Applications |
Editors | Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun |
Place of Publication | Switzerland |
Publisher | Springer |
Pages | 137-169 |
Number of pages | 33 |
ISBN (Electronic) | 9783031096402 |
ISBN (Print) | 9783031096396 |
DOIs | |
Publication status | Published - 1 Jan 2022 |