Skip to main content
Log in

Analytics on real time security attacks in healthcare, retail and banking applications in the cloud

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Cloud computing is used by large enterprises to provide services to customers. The major advantage of adapting cloud systems is that the clients need not have to manage the maintenance and operations of the cloud systems along with the maintenance of hardware but they will have full control over the data. The downsides of the cloud systems are the security threats that includes confidentiality and security issues. Software as a service, platform as a service, and infrastructure as a service; all comes with its own security issues of different complexities. The security challenges posed by cloud computing systems are overshadowing the economic edge it has. Based on the analysis of the research performed in the area of security issues in the cloud it is evident that a detailed analysis on the same will throw light on root causes and vulnerabilities. The research primarily throws light on the statistics and detailed analysis on the security attacks in the cloud systems in different domains. The paper focuses on the issues and threats in healthcare, retail and banking domains. Analytics on the attacks in these domains will give insights on the loss, mitigation time etc. The real time data on security threats is acquired from IT cloud service providers. The statistics on the same will open up different perspectives of cloud security issues and can throw light on the possible research directions and that is the motivation behind this preliminary research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Kanmani AC, Chockalingam T, Guruprasad N (2017) An exploratory study of RDF: a data model for cloud computing. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications. Springer, Singapore

  2. Mathew S (2014) Top 10 benefits of cloud CRM. In: Focal CRM, cloud-based solution, p 18

  3. Jose N, Kanmani AC (2013) Data security model enhancement in cloud environment. IOSR J Comput Eng (IOSR-JCE)

  4. Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: Proceedings of the 24th IEEE international conference on advanced information networking and applications (AINA), Perth, 20–23 April 2010, pp 27–33. https://doi.org/10.1109/AINA.2010.187

  5. Arulanandu CK, Murthy SVD, Nagraj G (2018) Cloud based RDF security: a secured data model for cloud computing. Int J Intel Eng Sys 11(1):83–93. https://doi.org/10.22266/ijies2018.0228.09

    Article  Google Scholar 

  6. Velte AT, Velte TJ, Elsenpeter R (2012) Cloud computing a practical approach. Velte Publishing, Inc

  7. Mell P, Grance T (2011) The NIST definition of cloud computing. NIST Special Publication, U.S. Department of commerce 800-145

  8. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  9. Zhu J (2010) Cloud computing technologies and applications. In: Furht B, Escalante A (eds) Handbook of cloud computing. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-6524-0_2

    Chapter  Google Scholar 

  10. Sarjapur K, Suma V, Christa S, Rao J (2016) Big data management system for personal privacy using SW and SDF. In: Information systems design and intelligent applications. Springer, New Delhi, pp 757–763

    Chapter  Google Scholar 

  11. Chen Y, Paxson V, Katz RH (2010) What’s new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 January 20.2010, pp 2010-5

  12. Popović K, Hocenski Ž (2010) Cloud computing security issues and challenges. In: The 33rd international convention MIPRO. IEEE 2010

  13. Youseff L, Butrico M, Da Silva D (2014) Onward a unified ontology of cloud computing. University of California, Santa Barbara, CA 93106, lyouseff@cs.ucsb.edu, IBM T.J. Watson Research Center,Yorktown, New York 10598, P-05

  14. Harfoushi O, Alfawwaz B, Ghatasheh NA, Obiedat R, Muaad M, Abu-Faraj, Faris H (2014) Data security Issues and challenges in cloud computing: a conceptual analysis and review. Commun Netw 6(1):15–21

    Article  Google Scholar 

  15. Zissis D, Lekks D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28:583–592

    Article  Google Scholar 

  16. Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Inter Comput 16(1):69–73. https://doi.org/10.1109/MIC.2012.14

    Article  Google Scholar 

  17. Flouris G, Fundulaki I, Michou M, Antoniou G (2010) Controlling access to RDF graphs. In: Future internet symposium, part of Lecture notes in computer science book series, LNCS, vol 6369, pp 107–117

  18. Kumar S, Goudar RH (2012) Cloud computing-research issues, challenges, architecture, platforms and applications: a survey. Int J Future Comput Commun 1(4):356–360

    Article  Google Scholar 

  19. Takabi H, Joshi JBD, Ahn G-J (2010) SecureCloud: towards a comprehensive security framework for cloud computing Environments. In: Annual IEEE computer software and applications conference workshops, p 393

  20. Rachapalli J, Khadilkar V, Kantarcioglu M, Thuraisingham B (2014) Towards fine grained RDF access control. In: The proceedings of ACM, p 165

  21. Guha R (2011) Software engineering on semantic web and cloud computing platform. http://www.cs.pitt.edu/~chang/231/y11/papers/cloudSE. Accessed 24 Oct 2012

  22. Kandukuri BR, Rakshit A (2009) Cloud security issues. In: 2009 IEEE international conference on services computing. IEEE 2009

  23. Patil GRMDA (2018) Data breaches as top security concern in cloud computing. Int J Pure Appl Math 119(14):19–28

    Google Scholar 

  24. Ramgovind S, Eloff MM, Smith E (2010) The management of security in cloud computing. In: 2010 information security for South Africa. IEEE, 2010

  25. Mahalle A et al (2018) Data privacy and system security for banking and financial services industry based on cloud computing infrastructure. In: 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD). IEEE 2018

  26. Bose R, Chakraborty S, Roy S (2019) Explaining the workings principle of cloud-based multi-factor authentication architecture on banking sectors. In: 2019 Amity international conference on artificial intelligence (AICAI). IEEE 2019

  27. Zhang L, Fan H, Xue C (2019) The development trend of the new retail format integration application cloud ERP system. In: 1st international conference on business, economics, management science (BEMS 2019). Atlantis Press

  28. Christa S, Suma V (2016) An analysis on the significance of ticket analytics and defect analysis from software quality perspective. In: 2016 international conference on inventive computation technologies (ICICT), vol 1. IEEE, 2016

  29. Hu B et al (2018) A robust retail POS system based on blockchain and edge computing. In: International conference on edge computing. Springer, Cham

  30. Christa S, Nair DTRG, Lakshmi Madhuri, Suma DV (2012) Data preprocessing model Using intelligent agents. In: International conference on information systems design and intelligent applications, 2012

  31. Patrich D et al (2017) Detection of attacks in the cloud by crowd sourcing security solutions. U.S. patent application no. 15/637,515, Version number 01-2017

  32. Esposito C et al (2018) Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput 5(1):31–37

    Article  Google Scholar 

  33. Iyengar A, Kundu A, Pallis G (2018) Healthcare informatics and privacy. IEEE Internet Comput 22(2):29–31

    Article  Google Scholar 

  34. Vijayakumar V et al (2019) E-health cloud security using timing enabled proxy re-encryption. Mobile Netw Appl 24(3):1034–1045

    Article  Google Scholar 

  35. Christa S, Madhuri KL, Suma V (2012) A comparative analysis of data mining tools in agent based systems. arXiv preprint arXiv:1210.1040

  36. Llorà X, Ács B, Auvil LS, Capitanu B, Welge M, Goldberg DE (2008) Meandre: semantic-driven data-intensive flows in the clouds. In: 2008 IEEE fourth international conference on eScience, Indianapolis, IN, 2008, pp 238–245. https://doi.org/10.1109/eScience.2008.172

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Padmaja.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Padmaja, K., Seshadri, R. Analytics on real time security attacks in healthcare, retail and banking applications in the cloud. Evol. Intel. 14, 595–605 (2021). https://doi.org/10.1007/s12065-019-00337-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-019-00337-z

Keywords

Navigation