A review on cloud security issues and solutions

被引:2
作者
Chaudhari, Ashish R. [1 ]
Gohil, Bhavesh N. [1 ]
Rao, Udai Pratap [1 ]
机构
[1] SVNIT, Comp Sci & Engn Dept, Surat, Gujarat, India
关键词
Cloud computing; Cloud security; virtualization; security issues; security solutions; AUTHENTICATION; CHALLENGES; SERVICE;
D O I
10.3233/JCS-210140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides computing resources, platforms, and applications as a service in a flexible, cost-effective, and efficient way. Cloud computing has integrated with industry and many other fields in recent years, which prompted researchers to look into new technologies. Cloud users have moved their applications, data and services to the Cloud storage due to the availability and scalability of Cloud services. Cloud services and applications are provided through the Internet-based on a pay-per-use model. Plenty of security issues are created due to the migration from local to remote computing for both Cloud users and providers. This paper discusses an overview of Cloud computing, as well as a study of security issues at various levels of Cloud computing. The article also provides a complete review of security issues with their existing solutions for a better understanding of specific open research issues.
引用
收藏
页码:365 / 391
页数:27
相关论文
共 71 条
  • [1] Abdul-Jabbar SS., 2020, J Southwest Jiaotong Univ, V55, DOI [10.35741/issn.0258-2724.55.1.11, DOI 10.35741/ISSN.0258-2724.55.1.11]
  • [2] Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
    Ahmad, Waqas
    Rasool, Aamir
    Javed, Abdul Rehman
    Baker, Thar
    Jalil, Zunera
    [J]. ELECTRONICS, 2022, 11 (01)
  • [3] Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment
    Ainapure, Bharati S.
    Shah, Deven
    Rao, A. Ananda
    [J]. PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 : 9 - 21
  • [4] Akhil KM, 2017, 2017 INT C INT COMP, P1
  • [5] Akshaya M. Swathy, 2019, Advances in Big Data and Cloud Computing. Proceedings of ICBDCC18. Advances in Intelligent Systems and Computing (AISC 750), P37, DOI 10.1007/978-981-13-1882-5_4
  • [6] Aldossary S, 2016, INT J ADV COMPUT SC, V7, P485
  • [7] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [8] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [9] [Anonymous], 1995, PGP: Pretty Good Privacy
  • [10] Arjunan K., 2017, ISEA Asia Secur. Priv. Conf. 2017, P1