Publicado:
2024-04-10Edição:
v. 21 n. 1 (2024)Seção:
Investigación y DesarrolloAmenazas emergentes en la computación en la nube: desafíos de seguridad y respuesta
Emerging threats in cloud computing: security challenges and response
Palavras-chave:
Computación en la nube, amenazas emergentes, seguridad en la nube, fuga de datos, DDoS (es).Palavras-chave:
Cloud computing, emerging threats, cloud security, data leakage, DDoS (en).Downloads
Resumo (es)
La computación en la nube ha revolucionado la gestión de datos y recursos, permitiendo a las organizaciones optimizar sus operaciones y reducir costos. Sin embargo, esta tecnología también ha dado lugar a nuevas amenazas y desafíos de seguridad que requieren atención urgente. Este artículo ofrece un análisis exhaustivo de las amenazas emergentes en la computación en la nube, como la fuga de datos, el secuestro de cuentas y los ataques de denegación de servicio (DDoS), y destaca los retos en la gestión de la seguridad, como la complejidad operativa, la falta de visibilidad sobre los recursos, y las dificultades para cumplir con las regulaciones. Además, se proponen estrategias de mitigación, incluyendo políticas de seguridad rigurosas, monitoreo continuo, y una colaboración estrecha con los proveedores de servicios en la nube. La seguridad en la nube es un desafío multifacético que demanda un enfoque integral para proteger los datos, mantener la integridad de los servicios y asegurar la continuidad del negocio.
Resumo (en)
Cloud computing has revolutionized data and resource management, enabling organizations to optimize their operations and reduce costs. However, this technology has also given rise to new security threats and challenges that require urgent attention. This article provides a comprehensive analysis of emerging threats in cloud computing, such as data leakage, account hijacking, and denial-of-service (DDoS) attacks, and highlights challenges in security management, such as operational complexity, lack of visibility over resources, and difficulties in complying with regulations. In addition, mitigation strategies are proposed, including rigorous security policies, continuous monitoring, and close collaboration with cloud service providers. Cloud security is a multifaceted challenge that demands a comprehensive approach to protect data, maintain service integrity, and ensure business continuity.
Referências
Michelena, Á., Aveleira Mata, J. A., Jove, E., Alaiz Moretón, H., Quintián, H., & Calvo-Rolle, J. L. (2023). Development of an intelligent classifier model for denial of service attack detection. International Journal of Interactive Multimedia and Artificial Intelligence, 8(3), 33-42.
Joyanes Aguilar, L. (2012). Computación en la nube.
Salah, K., Calero, J. M. A., Zeadally, S., Al-Mulla, S., & Alzaabi, M. (2012). Using cloud computing to implement a security overlay network. IEEE security & privacy, 11(1), 44-53.
Aguilar, L. J. (2012). COMPUTACIÓN EN LA NUBE: Notas para una estrategia española en cloud computing. Revista del Instituto Español de Estudios Estratégicos, (00).
Joyanes, L. (2012). Computación en la Nube: estrategias de cloud computing en las empresas. Alpha Editorial.
Arias, Á. (2015). Computación en la Nube: 2ª Edición. IT Campus Academy.
Ramírez, X. G., Duarte, M. A. G., & Gutiérrez, J. H. (2019). Seguridad en la nube, evolución indispensable en el siglo XXI. Revista vínculos, 16(1), 110-127.
Ahuja, N., Singal, G., Mukhopadhyay, D., & Kumar, N. (2021). Automated DDOS attack detection in software defined networking. Journal of Network and Computer Applications, 187, 103108.
Guaigua Bucheli, C. J. (2021). Algoritmos de seguridad para mitigar riesgos de datos en la nube: un mapeo sistemático (Bachelor's thesis).
Qian, L., Luo, Z., Du, Y., & Guo, L. (2009). Cloud computing: An overview. In Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings 1 (pp. 626-631). Springer Berlin Heidelberg.
Kumar, S. N., & Vajpayee, A. (2016). A survey on secure cloud: security and privacy in cloud computing. American Journal of Systems and Software, 4(1), 14-26.
Cui, Y., Qian, Q., Guo, C., Shen, G., Tian, Y., Xing, H., & Yan, L. (2021). Towards DDoS detection mechanisms in software-defined networking. Journal of Network and Computer Applications, 190, 103156.
Devi, B. K., & Subbulakshmi, T. (2016). A comparative analysis of security methods for DDoS attacks in the cloud computing environment. Indian Journal of Science and Technology, 9(34), 1-7.
Papadimitriou, P., & Garcia-Molina, H. (2010). Data leakage detection. IEEE Transactions on knowledge and data engineering, 23(1), 51-63.
Patil, A., Laturkar, A., Athawale, S. V., Takale, R., & Tathawade, P. (2017, August). A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security. In 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) (pp. 1-7). IEEE.
Vishwakarma, R., & Jain, A. K. (2020). A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommunication systems, 73(1), 3-25.
Deshmukh, R. V., & Devadkar, K. K. (2015). Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science, 49, 202-210.
Kim, W. (2009). Cloud computing: Today and tomorrow. J. Object Technol., 8(1), 65-72.
Alneyadi, S., Sithirasenan, E., & Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62, 137-152.
Nayak, S. K., & Ojha, A. C. (2020). Data leakage detection and prevention: Review and research directions. Machine Learning and Information Processing: Proceedings of ICMLIP 2019, 203-212.
Snehi, M., & Bhandari, A. (2021). Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks. Computer Science Review, 40, 100371.
Muttik, I., & Barton, C. (2009). Cloud security technologies. Information security technical report, 14(1), 1-6.
NextVision, “¿Qué es un ataque DDoS y cómo detenerlo?”, 2018. [Online]. Avialbale: https://nextvision.com/que-es-un-ataque-ddos-y-como-detenerlo/
Amrish, R., Bavapriyan, K., Gopinaath, V., Jawahar, A., & Kumar, C. V. (2022). DDoS detection using machine learning techniques. Journal of IoT in Social, Mobile, Analytics, and Cloud, 4(1), 24-32.
Lonea, A. M., Popescu, D. E., & Tianfield, H. (2013). Detecting DDoS attacks in cloud computing environment. International Journal of Computers Communications & Control, 8(1), 70-78.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges. IEEE potentials, 33(1), 34-36.
Como Citar
IEEE
ACM
ACS
APA
ABNT
Chicago
Harvard
MLA
Turabian
Vancouver
Baixar Citação
Visitas
Downloads
Licença
Copyright (c) 2024 Revista Vínculos
Este trabalho está licenciado sob uma licença Creative Commons Attribution-NonCommercial 4.0 International License.
Este obra está sob uma licença Creative Commons Atribuição 4.0