Critical Security Issues in Cloud Computing: A Survey

被引:12
作者
Sun, Xiaotong [1 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
来源
2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2018年
关键词
Cloud computing; security; privacy; data storage; networking security; SERVICE ATTACKS; ENCRYPTION;
D O I
10.1109/BDS/HPSC/IDS18.2018.00053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An exponential growth of cloud computing is dramatically changing contemporary network service manners. A large scope of cloud-based service offerings, X-as-a-Service (XaaS), are empowering flexible adoptions with on-demand provisions. However, cloud computing also introduces a series of security concerns, even though there are numerous advantages of using cloud computing. Understanding security concerns in cloud computing is a fundamental requirement for successfully adopting cloud solutions. This paper focuses on a variety of security issues in cloud computing and accomplishes a survey that addresses three major security dimensions of cloud security, including computer security, network security, and information security. Literature review provides a holistic view of cloud security as well as converges recent achievements in the field. The main findings of this work can provide future research in the field of cloud security with theoretical supports and evidence.
引用
收藏
页码:216 / 221
页数:6
相关论文
共 53 条
[31]   Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms [J].
Maiti, Anindya ;
Armbruster, Oscar ;
Jadliwala, Murtuza ;
He, Jibo .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :795-806
[32]   Dynamic Searchable Encryption via Blind Storage [J].
Naveed, Muhammad ;
Prabhakaran, Manoj ;
Gunter, Carl A. .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :639-654
[33]  
Qian L, 2009, LECT NOTES COMPUT SC, V5931, P626, DOI 10.1007/978-3-642-10665-1_63
[34]   Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry [J].
Qiu, Meikang ;
Gai, Keke ;
Thuraisingham, Bhavani ;
Tao, Lixin ;
Zhao, Hui .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :421-429
[35]   The state of network security [J].
Schneider, David .
Network Security, 2012, 2012 (02) :14-20
[36]  
Stehlé D, 2010, LECT NOTES COMPUT SC, V6477, P377, DOI 10.1007/978-3-642-17373-8_22
[37]  
Stolfo S. J., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P125, DOI 10.1109/SPW.2012.19
[38]   A survey on security issues in service delivery models of cloud computing [J].
Subashini, S. ;
Kavitha, V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :1-11
[39]   A Survey on Identity Management for the Future Network [J].
Torres, Jenny ;
Nogueira, Michele ;
Pujolle, Guy .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02) :787-802
[40]   Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation [J].
Tsoutsos, Nektarios Georgios ;
Maniatakos, Michail .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2014, 2 (01) :81-93