Review of cloud computing security

被引:0
作者
School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China [1 ]
机构
[1] School of Science and Technology, University of Science and Technology of China, Hefei
来源
Tien Tzu Hsueh Pao | 2013年 / 2卷 / 371-381期
关键词
Access control; Cloud computing; Confidentiality; Credibility; Data integrity; Public verifiability; Security of virtual machine;
D O I
10.3969/j.issn.0372-2112.2013.02.026
中图分类号
学科分类号
摘要
With the development of cloud computing in the academia and industry, it is inevitable that many security problems arise. This paper summarizes the security requirements of cloud computing, which not only cover the traditional security requirements like confidentiality, data integrity, access control and identity authentication, but also introduce new security requirements in the credibility, configuration and virtual machinery. We make conclusions about the security situations on two typical cloud computing products: Amazon Web Services and Windows Azure and elaborate two attack mechanisms against cloud computing: Denial of service attack and Side channel attack. Based on the security requirements and attacks against cloud computing, we systematically summarize the current security protection mechanisms and further make a comparison among them.
引用
收藏
页码:371 / 381
页数:10
相关论文
共 111 条
[21]  
Dijk M.V., Gentry C., Halevi S., Vaikuntanathan V., Fully Homomorphic encryption over the Integers, In EuroCrypt'10, pp. 24-43, (2010)
[22]  
Gentry C., A fully homomorphic encryption scheme, (2009)
[23]  
Sutar S.G., Patil G.A., Privacy management in cloud by making use of Homomorphic functions, International Journal of Computer Applications, 37, 2, pp. 13-16, (2012)
[24]  
Song D., Wagner D., Perrig A., Practical techniques for searches on encrypted data, In Proc of IEEE Symposium on Security and Privacy, (2000)
[25]  
Curtmola R., Garay J.A., Kamara S., Ostrovsky R., Searchable symmetric encryption: Improved definitions and efficient constructions, In Proc of ACM CCS'06, (2006)
[26]  
Boneh D., Crescenzo G.D., Ostrovsky R., Persiano G., Public key encryption with keyword search, In Proc of EUROCRYP'04, (2004)
[27]  
Bellare M., Boldyreva A., O'Neill A., Deterministic and efficiently searchable encryption, In Proceedings of Crypto of LNCS, 4622, (2007)
[28]  
Li J., Wang Q., Wang C., Cao N., Ren K., Lou W., Fuzzy keyword search over encrypted data in cloud computing, In IEEE INFOCOM'10, Mini-Conference, pp. 441-445, (2010)
[29]  
Wang C., Cao N., Li J., Ren K., Lou W., Secure ranked keyword search over encrypted cloud data, In ICDCS 2010, pp. 253-262, (2010)
[30]  
Cao N., Wang C., Li M., Ren K., Lou W.J., Privacy-preserving multi-keyword ranked search over encrypted cloud data, 31st International Conference on Distributed Computing Systems(ICDCS), pp. 393-402, (2011)