Review of cloud computing security

被引:0
作者
School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China [1 ]
机构
[1] School of Science and Technology, University of Science and Technology of China, Hefei
来源
Tien Tzu Hsueh Pao | 2013年 / 2卷 / 371-381期
关键词
Access control; Cloud computing; Confidentiality; Credibility; Data integrity; Public verifiability; Security of virtual machine;
D O I
10.3969/j.issn.0372-2112.2013.02.026
中图分类号
学科分类号
摘要
With the development of cloud computing in the academia and industry, it is inevitable that many security problems arise. This paper summarizes the security requirements of cloud computing, which not only cover the traditional security requirements like confidentiality, data integrity, access control and identity authentication, but also introduce new security requirements in the credibility, configuration and virtual machinery. We make conclusions about the security situations on two typical cloud computing products: Amazon Web Services and Windows Azure and elaborate two attack mechanisms against cloud computing: Denial of service attack and Side channel attack. Based on the security requirements and attacks against cloud computing, we systematically summarize the current security protection mechanisms and further make a comparison among them.
引用
收藏
页码:371 / 381
页数:10
相关论文
共 111 条
[1]  
Armbrust M., Fox A., Griffith R., Et al., A view of cloud computing, Commun ACM, 53, 4, pp. 50-58, (2010)
[2]  
Hayes B., Cloud computing, Commun ACM, 51, 7, pp. 9-11, (2008)
[3]  
Feng D.G., Zhang M., Zhang Y., Xu Z., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
[4]  
Popa L., Yu M., Et al., Cloud police: Taking access control out of the network, Hotnets'10. ACM 2010, pp. 1-6, (2010)
[5]  
Hao F., Lakshman T.V., Mukherjee S., Song H.Y., Secure cloud computing with a virtualized network infrastructure, The 2nd USENIX Conference on Hot Topics in Cloud Computing, pp. 1-7, (2010)
[6]  
Oberheide J., Cooke E., Jahanian F., Cloudav: N-version antivirus in the network cloud, Proceedings of the 17th Conference on Security Symposium, pp. 91-106, (2008)
[7]  
Oberheide J., Veeraraghavan K., Cooke E., Flinn J., Jahanian F., Virtualized in-cloud security services for mobiledevices, Proceedings of the First Workshop on Virtualization in Mobile Computing, pp. 31-35, (2008)
[8]  
Chow R., Jakobsson M., Masuoka R., Jlina, Niu Y., Shi E., Song Z., Authentication in the clouds: A framework and its application to mobile users, Proceedings of the 2010 ACM Workshop on Cloud computing Security Workshop, pp. 1-6, (2010)
[9]  
Portokalidis G., Homburg P., Anagnostakis K., Bos Paranoid H., Android: Versatile protection for smartphones, In Proceedings of the 26th Annual Computer Security Applications Conference, pp. 347-356, (2010)
[10]  
Wu J.-Y., Fu J.-Q., Ping L.-D., Xie Q., Study on the P2P cloud storage system, Acta Electronica Sinica, 38, 5, pp. 1100-1107, (2011)