Abstract
Cloud computing offers on demand, pay per use, and remote access to shared pool of resources, because of which several organizations are moving towards cloud. With increased adoption of cloud computing by number of organizations, data security and privacy concerns in cloud have also become increasingly prominent. It is important to maintain data security in the cloud to avoid any kind of data breaches. However, the problem of identifying the optimal solution for data security in cloud environment is very challenging because of various security and performance constraints. The aim of this paper is to emphasize the importance of data security in cloud computing by analyzing various data security techniques. The paper proposes a taxonomy of authentication, verification, and mitigation in multi-agent system cloud monitoring for data security risk mitigation in cloud computing environment. The authentication process will include node authentication, mutual authentication, data authentication and wireless sensor network (WSN) authentication. Verification will be based on the use of digital certificates and access control implementation. Mitigation will involve single sign on solution and live migration approach. The contribution of this work into the wide research area of data security in cloud computing is demonstrating various tools and techniques for data security risk mitigation. We verify the utility of the authentication, verification, and mitigation taxonomy by analyzing 15 research journals. This study will provide a comprehensive insight into already existing techniques for data security risk mitigation in cloud computing.
Original language | English |
---|---|
Title of host publication | Innovative Technologies in Intelligent Systems and Industrial Applications - CITISIA 2022 |
Editors | Subhas Chandra Mukhopadhyay, S.M. Namal Arosha Senanayake, P.W. Chandana Withana |
Publisher | Springer Science and Business Media Deutschland GmbH |
Pages | 227-238 |
Number of pages | 12 |
ISBN (Print) | 9783031290770 |
DOIs | |
Publication status | Published - 2023 |
Event | International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2022 - Sydney, Australia Duration: 14 Nov 2022 → 16 Nov 2022 |
Publication series
Name | Lecture Notes in Electrical Engineering |
---|---|
Volume | 1029 LNEE |
ISSN (Print) | 1876-1100 |
ISSN (Electronic) | 1876-1119 |
Conference
Conference | International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2022 |
---|---|
Country/Territory | Australia |
City | Sydney |
Period | 14/11/22 → 16/11/22 |
Bibliographical note
Publisher Copyright:© The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.
Keywords
- Authentication
- Mitigation
- Verification
- VM (virtual machine)