IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors

被引:16
作者
Chawki, El Balmany [1 ]
Ahmed, Asimi [1 ]
Zakariae, Tbatou [1 ]
机构
[1] Ibn Zohr Univ, Fac Sci, LabSiv Lab, Agadir, Morocco
来源
15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS | 2018年 / 134卷
关键词
IaaS; Cloud; Security; Issues; Virtualization; User; CSP; Behavior;
D O I
10.1016/j.procs.2018.07.180
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IaaS model is arguably the most fundamental service delivery model in cloud computing. It holds a wide variety of virtualized IT resources and furnished as on-demand services. Platform virtualization represents the quintessence of this model whereby user has the ability to provision and manage its own environment into remote physical servers (CPU, storage servers) within Internet. However, users are still reluctant to migrate its own private data into cloud servers because of security, which remains the most inhibitor of cloud computing's growth. In this paper, we thoroughly explore the security issues within IaaS model components on behalf CSP and user security behaviors. Furthermore, the CSA Top 12 threats that hamper the flexibility and scalability of IaaS model. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:328 / 333
页数:6
相关论文
共 24 条
[1]  
[Anonymous], 2010, Informatics and Systems (INFOS), The 7th International Conference
[2]  
[Anonymous], NIST SPECIAL PUBLICA
[3]   State of the art and challenges of security SLA for cloud computing [J].
Batista de Carvalho, Carlos Andre ;
de Castro Andrade, Rossana Maria ;
de Castro, Miguel Franklin ;
Coutinho, Emanuel Ferreira ;
Agoulmine, Nazim .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 :141-152
[4]   Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing [J].
Bhushan, Kriti ;
Gupta, Brij B. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (04) :4267-4298
[5]  
Halboob W., 2014, LECT NOTES COMPUTER
[6]   An analysis of security issues for cloud computing [J].
Hashizume, Keiko ;
Rosado, David G. ;
Fernandez-Medina, Eduardo ;
Fernandez, Eduardo B. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) :1-13
[7]   On cloud security attacks: A taxonomy and intrusion detection and prevention as a service [J].
Iqbal, Salman ;
Kiah, Laiha Mat ;
Dhaghighi, Babak ;
Hussain, Muzammil ;
Khan, Suleman ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 :98-120
[8]  
Kaaniche Nesrine, 2017, DATA SECURITY PRIVAC, DOI [10.1016/j.comcom.2017.07.006., DOI 10.1016/J.C0MC0M.2017.07.006]
[9]   Exploring Data Security Issues and Solutions in Cloud Computing [J].
Kumar, P. Ravi ;
Raj, P. Herbert ;
Jelciana, P. .
6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 :691-697
[10]   Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities [J].
Madni, Syed Hamid Hussain ;
Abd Latiff, Muhammad Shafie ;
Coulibaly, Yahaya ;
Abdulhamid, Shafi'i Muhammad .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :173-200