Security and Privacy Challenges in Cloud Computing

被引:0
作者
Abdullah, Salasiah [1 ]
Abu Bakar, Khairul Azmi [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi, Selangor, Malaysia
来源
PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC) | 2018年
关键词
security; cloud computing; access control; privacy; ADOPTION; MODEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users' privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.
引用
收藏
页数:3
相关论文
共 20 条
[11]  
Nabeel M., 2011, Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), P172, DOI 10.4108/icst.collaboratecom.2011.247061
[12]  
Ricardo dos Santos D., 2016, FRAMEWORK RISK ASSES
[13]   Cloud computing security: The scientific challenge, and a survey of solutions [J].
Ryan, Mark D. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (09) :2263-2268
[14]   State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions [J].
Shahzad, Farrukh .
5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS, 2014, 37 :357-362
[15]   A survey on security issues in service delivery models of cloud computing [J].
Subashini, S. ;
Kavitha, V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :1-11
[16]   Secure Data Sharing and Processing in Heterogeneous Clouds [J].
Suzic, Bojan ;
Reiter, Andreas ;
Reimair, Florian ;
Venturi, Daniele ;
Kubo, Baldur .
1ST INTERNATIONAL CONFERENCE ON CLOUD FORWARD: FROM DISTRIBUTED TO COMPLETE COMPUTING, 2015, 68 :116-126
[17]   Security and Privacy Challenges in Cloud Computing Environments [J].
Takabi, Hassan ;
Joshi, James B. D. ;
Ahn, Gail-Joon .
IEEE SECURITY & PRIVACY, 2010, 8 (06) :24-31
[18]   Security and privacy for storage and computation in cloud computing [J].
Wei, Lifei ;
Zhu, Haojin ;
Cao, Zhenfu ;
Dong, Xiaolei ;
Jia, Weiwei ;
Chen, Yunlu ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2014, 258 :371-386
[19]   An access control model for cloud computing [J].
Younis, Younis A. ;
Kifayat, Kashif ;
Merabti, Madjid .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) :45-60
[20]   Addressing cloud computing security issues [J].
Zissis, Dimitrios ;
Lekkas, Dimitrios .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2012, 28 (03) :583-592