Visible to the public Ransomware: The CryptoVirus Subverting Cloud Security

TitleRansomware: The CryptoVirus Subverting Cloud Security
Publication TypeConference Paper
Year of Publication2017
AuthorsBhattacharya, S., Kumar, C. R. S.
Conference Name2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)
ISBN Number978-1-5090-3378-2
KeywordsBusiness, business enterprises, cloud, cloud architecture, cloud computing, cloud network, cloud platforms, Cloud Security, cloud technology, cloud threat mechanisms, Computer architecture, computer viruses, cryptography, CryptoVirus, disparate locations, Human Behavior, human factors, information technology, IT security specialists, Malware, Metrics, pubcrawl, ransomware, ransomware attack, ransomware vulnerabilities, Resiliency, Scalability, security, security effectiveness, security threat, Servers, threats, ubiquitous computing, Ubiquitous Computing Security, ubiquitous environment, vulnerabilities
Abstract

Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness of this platform interspersed with threats which can bring everything that subscribes to the cloud, to a halt raises questions. However advantages of cloud platforms far outweighs drawbacks and study of new challenges helps overcome drawbacks of this technology. One such emerging security threat is of ransomware attack on the cloud which threatens to hold systems and data on cloud network to ransom with widespread damaging implications. This provides huge scope for IT security specialists to sharpen their skillset to overcome this new challenge. This paper covers the broad cloud architecture, current inherent cloud threat mechanisms, ransomware vulnerabilities posed and suggested methods to mitigate it.

URLhttp://ieeexplore.ieee.org/document/8186691/
DOI10.1109/ICAMMAET.2017.8186691
Citation Keybhattacharya_ransomware:_2017