Security and Privacy in Cloud Computing: Technical Review

被引:41
|
作者
Abdulsalam, Yunusa Simpa [1 ]
Hedabou, Mustapha [1 ]
机构
[1] Univ Mohammed VI Polytech, Sch Comp & Commun Sci, DNA Lab, Lot 660, Hay Moulay Rachid 43150, Ben Guerir, Morocco
关键词
cloud computing; security; privacy; privacy preserving; CHALLENGES; STORAGE; PROTECTION; ISSUES; SYSTEM;
D O I
10.3390/fi14010011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the present security flaws. The literature also provides an extensive review of security and privacy issues in cloud computing. Unfortunately, the works provided in the literature lack the flexibility in mitigating multiple threats without conflicting with cloud security objectives. The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. Conversely, studies that offer technical solutions to security threats have failed to explain how such security threats exist. This paper aims to introduce security and privacy issues that demand an adaptive solution approach without conflicting with existing or future cloud security. This paper reviews different works in the literature, taking into account its adaptiveness in mitigating against future reoccurring threats and showing how cloud security conflicts have invalidated their proposed models. The article further presents the security threats surrounding cloud computing from a user perspective using the STRIDE approach. Additionally, it provides an analysis of different inefficient solutions in the literature and offers recommendations in terms of implementing a secure, adaptive cloud environment.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] A Review on Privacy and Security Assessment of Cloud Computing
    Jain, Khushboo
    Gupta, Manali
    Abraham, Ajith
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2021, 16 (05): : 161 - 168
  • [2] Review of Security and Privacy Techniques in Cloud Computing Environment
    Mote, Rutuja
    Pawar, Ambika
    Dani, Ajay
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 543 - 551
  • [3] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [4] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [5] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [6] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [7] A Short Review on Data Security and Privacy Issues in Cloud Computing
    Arjun, U.
    Vinay, S.
    2016 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2016,
  • [8] Security and privacy issues in cloud computing
    Haider Abbas
    Olaf Maennel
    Saïd Assar
    Annals of Telecommunications, 2017, 72 : 233 - 235
  • [9] Cloud Computing: Security, Privacy and Practice
    Xiang, Yang
    Di Martino, Beniamino
    Wang, Guilin
    Li, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2015, 52 : 59 - 60
  • [10] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11