Critical Security Issues in Cloud Computing: A Survey

被引:12
作者
Sun, Xiaotong [1 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
来源
2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2018年
关键词
Cloud computing; security; privacy; data storage; networking security; SERVICE ATTACKS; ENCRYPTION;
D O I
10.1109/BDS/HPSC/IDS18.2018.00053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An exponential growth of cloud computing is dramatically changing contemporary network service manners. A large scope of cloud-based service offerings, X-as-a-Service (XaaS), are empowering flexible adoptions with on-demand provisions. However, cloud computing also introduces a series of security concerns, even though there are numerous advantages of using cloud computing. Understanding security concerns in cloud computing is a fundamental requirement for successfully adopting cloud solutions. This paper focuses on a variety of security issues in cloud computing and accomplishes a survey that addresses three major security dimensions of cloud security, including computer security, network security, and information security. Literature review provides a holistic view of cloud security as well as converges recent achievements in the field. The main findings of this work can provide future research in the field of cloud security with theoretical supports and evidence.
引用
收藏
页码:216 / 221
页数:6
相关论文
共 53 条
[1]  
Abts D, 2012, COMMUN ACM, V55, P44, DOI [10.1145/2184319.2184335, 10.1145/2184318.2184335]
[2]  
[Anonymous], 2011, NIST DEFINITION CLOU
[3]  
[Anonymous], 2014, NDSS
[4]  
[Anonymous], J NETW COMPUT APPL
[5]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[6]   Cyber Scanning: A Comprehensive Survey [J].
Bou-Harb, Elias ;
Debbabi, Mourad ;
Assi, Chadi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1496-1519
[7]   Throughput Optimization, Spectrum Allocation, and Access Control in Two-Tier Femtocell Networks [J].
Cheung, Wang Chi ;
Quek, Tony Q. S. ;
Kountouris, Marios .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (03) :561-574
[8]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]   On New Approaches of Assessing Network Vulnerability: Hardness and Approximation [J].
Dinh, Thang N. ;
Xuan, Ying ;
Thai, My T. ;
Pardalos, Panos M. ;
Znati, Taieb .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (02) :609-619