Review of cloud computing security

被引:0
作者
School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China [1 ]
机构
[1] School of Science and Technology, University of Science and Technology of China, Hefei
来源
Tien Tzu Hsueh Pao | 2013年 / 2卷 / 371-381期
关键词
Access control; Cloud computing; Confidentiality; Credibility; Data integrity; Public verifiability; Security of virtual machine;
D O I
10.3969/j.issn.0372-2112.2013.02.026
中图分类号
学科分类号
摘要
With the development of cloud computing in the academia and industry, it is inevitable that many security problems arise. This paper summarizes the security requirements of cloud computing, which not only cover the traditional security requirements like confidentiality, data integrity, access control and identity authentication, but also introduce new security requirements in the credibility, configuration and virtual machinery. We make conclusions about the security situations on two typical cloud computing products: Amazon Web Services and Windows Azure and elaborate two attack mechanisms against cloud computing: Denial of service attack and Side channel attack. Based on the security requirements and attacks against cloud computing, we systematically summarize the current security protection mechanisms and further make a comparison among them.
引用
收藏
页码:371 / 381
页数:10
相关论文
共 111 条
[31]  
Amazon simple storage service
[32]  
Amazon elastic block storage
[33]  
Why nirvanix
[34]  
Kleiminger M., Stream processing in the cloud, (2010)
[35]  
Kleiminger M., Kalyvianaki E., Et al., Balancing load in stream processing with the cloud, IEEE 27th International Conference on Data Engineering Workshops, pp. 16-21, (2011)
[36]  
Du J., Wei W., Et al., RunTest: Assuring integrity of dataflow processing in cloud computing infrastructures, In Proc 5th ACM Symposium on Information, Computer and Communications Security, pp. 293-304, (2010)
[37]  
Du J., Gu X., Et al., On verifying stateful dataflow processing services in large-scale cloud systems, Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 672-674, (2010)
[38]  
Du J., Shah N., Et al., Adaptive data-driven service integrity attestation for multi-tenant cloud systems, IEEE 19th International Workshop on Quality of Service, pp. 1-9, (2011)
[39]  
Ateniese G., Burns R., Et al., Provable data possession at untrusted stores, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598-609, (2007)
[40]  
Wang C., Wang Q., Et al., Privacy-preserving public auditing for data storage security in cloud computing, InfoCom 2010 Proceeding, pp. 1-9, (2010)