Security and Privacy Challenges in Cloud Computing

被引:0
作者
Abdullah, Salasiah [1 ]
Abu Bakar, Khairul Azmi [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
来源
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC) | 2018年
关键词
security; cloud computing; access control; privacy; ADOPTION; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.
引用
收藏
页数:3
相关论文
共 20 条
[1]   Cloud Adoption in Malaysia: Trends, Opportunities, and Challenges [J].
Abolfazli, Saeid ;
Sanaei, Zohreh ;
Tabassi, Ali ;
Rosen, Steven ;
Gani, Abdullah ;
Khan, Samee U. .
IEEE CLOUD COMPUTING, 2015, 2 (01) :60-68
[2]  
Abu Bakar KA, 2015, PROC INT CONF COMP, P417
[3]  
[Anonymous], 2011, NIST DEFINITION CLOU
[4]  
Castillo-Montoya M, 2016, QUAL REP, V21, P811
[5]  
Hepsiba C., 2016, International Journal of Computer Science and Mobile Computing, V5, P610
[6]  
ISACA/CSA, 2015, CLOUD COMP MARK MAT
[7]   Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework [J].
Khan, Nabeel ;
Al-Yasiri, Adil .
11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 :485-490
[8]   Security Issues In Service Model Of Cloud Computing Environment [J].
Krishna, B. Hari ;
Kiran, S. ;
Murali, G. ;
Reddy, R. Pradeep Kumar .
FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 :246-251
[9]   Scalable Multivariate Time-Series Models for Climate Informatics [J].
Liu, Yan .
Computing in Science and Engineering, 2015, 17 (06) :19-26
[10]   Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme [J].
Memon, Imran ;
Hussain, Ibrar ;
Akhtar, Rizwan ;
Chen, Gencai .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) :1487-1508