Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies DOI Open Access
Sina Ahmadi

Journal of Information Security, Journal Year: 2024, Volume and Issue: 15(02), P. 148 - 167

Published: Jan. 1, 2024

Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for to ensure the security of their applications, data, cloud-based networks use cloud services effectively. This systematic literature review aims determine latest regarding security, specific emphasis on threats mitigation strategies. Additionally, highlights some common related such as distributed denial-of-service (DDoS) attacks, account hijacking, malware data breaches. research also explores strategies, awareness training, vulnerability management, event management (SIEM), identity access (IAM), encryption techniques. It discusses emerging trends integrating artificial intelligence (AI) machine learning (ML), serverless computing, containerization, well effectiveness shared responsibility model its challenges. The importance user impact technologies have been discussed detail mitigate risks. A previous scholarly articles conducted provide insights security. shows need continuous innovation address maintain security-conscious culture company.

Language: Английский

From Corrective to Predictive Maintenance—A Review of Maintenance Approaches for the Power Industry DOI Creative Commons
Marek Molęda, Bożena Małysiak-Mrozek, Weiping Ding

et al.

Sensors, Journal Year: 2023, Volume and Issue: 23(13), P. 5970 - 5970

Published: June 27, 2023

Appropriate maintenance of industrial equipment keeps production systems in good health and ensures the stability processes. In specific sectors, such as electrical power industry, failures are rare but may lead to high costs substantial economic losses not only for plant consumers larger society. Therefore, industry relies on a variety approaches tasks, ranging from traditional solutions engineering know-how smart, AI-based analytics avoid potential downtimes. This review shows evolution support planning, monitoring supervision. We present older techniques traditionally used tasks those that rely IT automate perform inference process failure detection. analyze prognostics health-management detail, including their requirements, advantages limitations. The focuses power-generation sector. However, some issues addressed common other industries. article also presents concepts utilize emerging technologies related Industry 4.0, touching prescriptive analysis, Big Data Internet Things. primary motivation purpose existing practices classic methods by engineers, well modern drawing Artificial Intelligence concept 4.0. summary state art area predictive provides two benefits. On one hand, it leads improving processes matching tools methods. researchers directions further analysis new developments.

Language: Английский

Citations

73

On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security DOI Creative Commons
Alexandr Kuznetsov, Paolo Sernani, Luca Romeo

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 3881 - 3897

Published: Jan. 1, 2024

As reliance on disruptive applications based Artificial Intelligence (AI) and Blockchain grows, the need for secure trustworthy solutions becomes ever more critical. Whereas much research has been conducted AI Blockchain, there is a shortage of comprehensive studies examining their integration from security perspective. Hence, this survey addresses such gap provides insights policymakers, researchers, practitioners exploiting Blockchain's evolving integration. Specifically, paper analyzes potential benefits as well related concerns, identifying possible mitigation strategies, suggesting regulatory measures, describing impact it public trust.

Language: Английский

Citations

33

Achieving Balance Between Innovation and Security in the Cloud With Artificial Intelligence of Things DOI

R. Sundar,

P. Balaji Srikaanth,

Darshana A. Naik

et al.

Advances in web technologies and engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 26

Published: May 16, 2024

This chapter explores the integration of Semantic Web control models, innovation, and security in cloud computing, especially context AIoT integration. The provides machine-understandable data offers sophisticated models that enhance innovation environments. Technologies like RDF, OWL, SPARQL enable semantic interoperability, while focus on access mechanisms authentication strategies. introduces concept AIoT, integrating AI with IoT devices discusses potential managing risks fostering innovation.

Language: Английский

Citations

19

Human–machine interaction towards Industry 5.0: Human-centric smart manufacturing DOI Creative Commons

Jialu Yang,

Ying Liu, Phillip L. Morgan

et al.

Digital engineering., Journal Year: 2024, Volume and Issue: 2, P. 100013 - 100013

Published: Aug. 1, 2024

Since the concept of Industry 5.0 was proposed, emphasis on human–machine​ interaction (HMI) in industrial scenarios has continued to increase. HMI is part factory's development towards 5.0, mainly because can help realise human-centric vision. At same time, achieve sustainable and resilient goals proposed by green, smart, more advanced technologies are also considered important driving factors for factories 5.0. Human-centric smart manufacturing (HCSM) that integrate with expected become paradigm future manufacturing. Therefore, it necessary discuss research directions may promote implementation HCSM future. In a factory, signals will go through process being collected sensors, processed, transmitted data analysis centre output complete interaction. Based this process, we divide into four parts: sensor hardware, processing, transmission mechanism, collaboration. Through systematic literature review article evaluates summarises current field categorises them parts process. usage some relatively limited, introduction focuses possible applications problems they face. Finally, opportunities challenges revealed discussed.

Language: Английский

Citations

18

Possible Applications of Edge Computing in the Manufacturing Industry—Systematic Literature Review DOI Creative Commons

Kacper Kubiak,

Grzegorz Dec, Dorota Stadnicka

et al.

Sensors, Journal Year: 2022, Volume and Issue: 22(7), P. 2445 - 2445

Published: March 22, 2022

This article presents the results of research with main goal identifying possible applications edge computing (EC) in industry. study used methodology systematic literature review and text mining analysis. The findings showed that primary EC is to reduce time required transfer large amounts data. With ability analyze data at edge, it obtain immediate feedback use decision-making process. However, implementation requires investments not only infrastructure, but also development employee knowledge related modern methods based on artificial intelligence. As analyses showed, great importance attached energy consumption, both ongoing production processes for purposes transmission paper highlights problems quality management. Based analyses, we indicate further directions application associated technologies are area intelligent resource scheduling (for flexible systems autonomous systems), anomaly detection resulting decision making, analysis transfer, management smart designing), simulations systems).

Language: Английский

Citations

40

Decoding the data economy: a literature review of its impact on business, society and digital transformation DOI
Andrea Sestino, Adham Kahlawi, Andrea De Mauro

et al.

European Journal of Innovation Management, Journal Year: 2023, Volume and Issue: unknown

Published: Aug. 1, 2023

Purpose The data economy, emerging from the current hyper-technological landscape, is a global digital ecosystem where gathered, organized and exchanged to create economic value. This paper aims shed light on interplay of different topics involved in as found literature. study research provides comprehensive understanding opportunities, challenges implications economy for businesses, governments, individuals society at large, while investigating its impact business value creation, knowledge transformation. Design/methodology/approach authors conducted literature review that generated conceptual map by analyzing corpus papers through combination machine learning algorithms, text mining techniques qualitative approach. Findings findings revealed eight collectively represent essential features literature, namely (1) Data Security, (2) Technology Enablers, (3) Business Implications, (4) Social (5) Political Framework, (6) Legal (7) Privacy Concerns (8) Marketplace. resulting model may help researchers practitioners develop concept structured way provide subset specific areas require further exploration. Practical Practically, this offers managers marketers valuable insights comprehend how manage opportunities deriving constantly changing competitive arena whose today also economy. Socially, reveal explaining be exploited build better society. Originality/value first exploring opportunity creation critical perspective.

Language: Английский

Citations

38

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment DOI Creative Commons
Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore

et al.

Journal of Cloud Computing Advances Systems and Applications, Journal Year: 2023, Volume and Issue: 12(1)

Published: Jan. 23, 2023

Abstract There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach proposed this assessment to deal with problem of identifying new, complicated threats and appropriate countermeasures. In particular, zero-day attacks multi-step assaults, which are made up a number different phases, some malicious others benign, illustrate well. paper, we propose highly Boosted Neural Network detect multi-stageattack scenario. This paper demonstrated results executing various machine learning algorithms enormously boosted neural network. The accuracy level achieved prediction multi-stage cyber 94.09% (Quest Model), 97.29% (Bayesian Network), 99.09% (Neural Network). evaluation Multi-Step Cyber-Attack Dataset (MSCAD) show that Extremely can predict attack 99.72% accuracy. Such accurate plays vital role managing real-time communication.

Language: Английский

Citations

28

Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning DOI Creative Commons

Muhammad Mehmood,

Rashid Amin, Muhana Magboul Ali Muslam

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 46561 - 46576

Published: Jan. 1, 2023

Because of the recent exponential rise in attack frequency and sophistication, proliferation smart things has created significant cybersecurity challenges. Even though tremendous changes cloud computing brought to business world, its centralization makes it challenging use distributed services like security systems. Valuable data breaches might occur due high volume that moves between businesses service suppliers, both accidental malicious. The malicious insider becomes a crucial threat organization since they have more access opportunity produce damage. Unlike outsiders, insiders possess privileged proper information resources. In this work, machine learning-based system for detection classification is proposed developed systematic approach identify various anomalous occurrences may point anomalies problems associated with privilege escalation. By combining many models, ensemble learning enhances outcomes enables greater prediction performance. Multiple studies been presented regarding detecting irregularities vulnerabilities network systems find flaws or threats involving But these lack identification attacks. This study proposes evaluates ensembles Machine (ML) techniques context. paper implements algorithms A customized dataset from multiple files CERT used. Four algorithms, i.e., Random Forest (RF), Adaboost, XGBoost, LightGBM, are applied analyzed results. Overall, LightGBM performed best. However, some other such as RF AdaBoost, perform better on internal attacks (Behavioral Biometrics attacks) Therefore, there room incorporating than one algorithm obtain stronger Among provides highest accuracy 97%; values at 86%, AdaBoost 88%, XGBoost 88.27%.

Language: Английский

Citations

25

Innovations in Security: A Study of Cloud Computing and IoT DOI Creative Commons

Hamza Azam,

Muhammed Ahnaf Tajwar,

Sathesan Mayhialagan

et al.

International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence, Journal Year: 2023, Volume and Issue: 2(1)

Published: Nov. 14, 2023

Cloud computing and IoT security are pivotal technologies that have reshaped the IT landscape. Leading tech giants like Google, Microsoft, Amazon harnessed their potential, continually enhancing these services. Despite increasing user bases, face significant hurdles, with emerging as foremost challenge. This paper delves into aspects of both cloud services, encompassing components, processes, threats, real-world examples security-related technologies. We also explore impacts, including benefits, limitations, future potential In our exploration, we define Internet Things (IoT) to provide a foundational understanding then investigate applications, highlighting relevance ubiquity in various domains. The core this revolves around discussion issues IoT. For IoT, dissect offering technology illustrate significance. Similarly, for computing, delve its threats while showcasing practical applications impact section assesses benefits security. It candidly addresses issues, challenges associated technologies, insights advancements. comprehensive study underscores significance domains valuable resource practitioners researchers. As continue evolve, implications is crucial harnessing full potential.

Language: Английский

Citations

23

Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges DOI Creative Commons

Annas Wasim Malik,

David Samuel Bhatti, Tae‐Jin Park

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(2), P. 433 - 433

Published: Jan. 10, 2024

Cloud computing technology is rapidly becoming ubiquitous and indispensable. However, its widespread adoption also exposes organizations individuals to a broad spectrum of potential threats. Despite the multiple advantages cloud offers, remain cautious about migrating their data applications due fears breaches security compromises. In light these concerns, this study has conducted an in-depth examination variety articles enhance comprehension challenges related safeguarding fortifying within environment. Furthermore, research scrutinized several well-documented breaches, analyzing financial consequences they inflicted. Additionally, it scrutinizes distinctions between conventional digital forensics forensic procedures specific computing. As result investigation, concluded by proposing opportunities for further in critical domain. By doing so, contributes our collective understanding complex panorama protection security, while acknowledging evolving nature need ongoing exploration innovation field. This helps compound annual growth rate (CAGR) forensics, which found be quite high at ≈16.53% from 2023 2031. Moreover, market expected reach ≈USD 36.9 billion year 2031; presently, 11.21 billion, shows that there are great investment area. strategically addresses emerging providing comprehensive approach navigating overcoming complexities associated with landscape

Language: Английский

Citations

14