A service provider, who must assure the quality of service to his clients providing a cloud computing systems, will be responsible for providing a secure cloud environment, those can be achieve by both applying stringent security policies and advanced security technologies [1].
1. Security policy enhancement
With a valid credit card, anyone will be able to use resources provided by CSP. This let hackers to abuse the powerful computing power of clouds to conduct malicious activities. By mitigating such abuse behavior caused by weak registration systems, credit card fraud monitoring and block of public black lists could be applied [7]. For example, Amazon has defined a clear user’s policy and isolates (or even terminates) any offending instances whenever they receive a complaint of spam or malware coming through Amazon EC2 [8].
2. Data protection
Data breaches caused by insiders could be either accidental or intentional. Identifying the insiders’ behavior is difficult, so we will need security tools that can deal with the insider threats such as data loss prevention systems, anomalous behavior pattern detection tools, format preserving and encryption tools, user behavior profiling, decoy technology, and authentication and authorization technologies [1]. These tools …show more content…
The early detection of the vulnerabilities in the security and the errors in the system settings will help the system administrator to correct those vulnerabilities before any hacker attack [11]. By using security tools for cloud systems such as Nikto [12], Sandcat [13] to perform regular vulnerability scan and security self-testing on the system, and it will return a highly detailed report of the