HCI Authentication to Prevent Internal Threats in Cloud Computing

2020 
Cloud computing reduces physical resources and simplifies common management tasks. Over the past decade, cloud computing has become an important IT (information technology) industry, driving cost savings, flexibility, convenience, and scalability. Despite these advantages, many government organizations and companies are still cautious about using cloud computing. They continue to believe that the threats inherent in cloud computing technology are greater and deadly than traditional technologies. Cloud computing security threats typically include insider attacks, malware attacks, information leaks and losses, distributed denial of service, and application programming interface vulnerability attacks. Technical security improvements for virtual networks are actively researched, and many are working hard. But defending against internal attackers is more than just a technical solution but a complement to manuals and company policy. In reality, however, there are cases of damage by internal attackers, and the damage is getting bigger. Technically malicious internal attackers can relatively easily manipulate the control system and cause malfunctions. This paper provides comprehensive information about security threats in cloud computing, shows the severity of attacks by insiders, analyzes the latest authentication technologies for human–computer interaction, and identifies the pros and cons. This shows how HCI (human–computer interaction) technology can be applied to cloud computing management servers. The result is an innovative security certification model that can be applied.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    17
    References
    0
    Citations
    NaN
    KQI
    []