Enhancing Features of Cloud Computing Using Cloud Access Security Brokers to Avoid Data Breaches
Article Main Content
Data breaches have gained widespread attention as businesses of all sizes become increasingly reliant on digital data, cloud computing, and workforce mobility. Cloud applications reduce costs and improve productivity. But it is equally important to monitor and protect data in a cloud environment. These are the questions that arise how to deal with lost visibility, unmanaged devices, and careless users. This paper explains how cloud access security brokers (CASBs) extend security to cloud applications, awareness for data breaches, providing visibility, threat protection, access control, and compliance. The key characteristics and benefits of cloud access security brokers (CASBs) are visibility, threat protection, access control and compliance are key components of this paper to extend data loss prevention (DLP). There is need to create the architecture of CABs having feature to deal with all types of Data Breaches. The result of the study provided a secure architecture to fulfill the security needs and tracks the complex connections between enterprise infrastructure and its cloud service provider.
References
-
Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang, "A Cloud Access Security Broker Based Approach for Encrypted Data Search and Sharing”, IEEE Xplore,2017
Google Scholar
1
-
Eduardo B. Fernandez, Nobuka ZU Yoshioka, Hironori Washizaki, "Cloud Access Security Broker (CASB): A Pattern for Secure Access to Cloud Services", 4th Asian Conference on Pattern Languages of Programs (Asianplop 2015)
Google Scholar
2
-
Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang, "Safebox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications", 2017 International Conference On Security, Pattern Analysis, And Cybernetics, IEEE
Google Scholar
3
-
Opeyemi Osanaiye, Shuo Chen, Zheng Yan, "From Cloud to Fog Computing: A Review and A Conceptual Live Vm Migration Framework", IEEE, April 12, 2017
Google Scholar
4
-
Fog Computing and Internet of Things: Extend The Cloud to Where the Things Are, Accessed On Apr. 18, 2017. [Online]. http://Www.Cisco.Com/ C/Dam/En_Us/Solutions/Trends/Iot/Docs/Computing-Overview.Pdf/
Google Scholar
5
-
N. vurukonda, B. Thirumala Rao, "A Study On Data Storage Security Issues In Cloud Computing",2nd international conference on intelligent computing", Communication & Convergence (ICCC-2016)
Google Scholar
6
-
Vivek Kumar Prasad, Viraj M Mavawala,"Enhancement in Fiat Shamir Cryptography Algorithm", International Journal of Innovations & Advancement in Computer Science, September 2015.
Google Scholar
7
-
Preeti Kumari, Parmeet Kaur,"A survey of fault tolerance in cloud computing", Journal of King Saud University - Computer and Information Sciences, October 2018
Google Scholar
8
-
Nabeel khan a, Adil Al-Yasiri,"Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework" The 2nd International Workshop On Internet of Thing: Networking Applications and Technologies (IOTNAT- 2016)
Google Scholar
9
-
Tulin Atmaca, Thomas Begin, Alexandre Brandwajn, Hind Castel-Taleb, "Performance Evaluation of Cloud Computing Centers with General Arrivals and Service" IEEE Xplore Digital Library 2016
Google Scholar
10
-
Shichao Guan, "A Multi-Layered Scheme for Distributed Simulations On the Cloud Environment", IEEE XPLORE,2016
Google Scholar
11
-
Dan Gonzales, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, Dulani Woods, " Cloud-Trust—A Security Assessment Model for Infrastructure as A Service (Iaas) Clouds", IEEE Transactions On Cloud Computing, volume: 5, issue: 3, July-Sept. 1 2017
Google Scholar
12
-
Kwang Mong Sim,"Agent-Based Approaches for Intelligent Intercloud Resource Allocation", IEEE Transactions on Cloud Computing ,2018
Google Scholar
13
-
Blesson Varghese, Massimo Villari , Omer Rana , Philip James , Tejal Shah , Maria Fazio , Rajiv Ranjan, "Realizing Edge Marketplaces: Challenges And Opportunities" Published in: “IEEE Cloud Computing”, volume: 5, issue: 6, Nov./Dec. 2018
Google Scholar
14
-
P. Ravi Kumar, P.Herbet Raj, P.jeliciana, "Exploring Data Security Issues And Solutions In Cloud Computing", 6th international conference on smart computing and communications, ICSCC 2018.
Google Scholar
15
-
B. Hari Krishna, Dr.S. Kiran, G. Murali, "Security Issues in Service Model of Cloud Computing Environment", International Conference on Computational Science, 2016.
Google Scholar
16





