A note on cloud computing security

被引:4
作者
Garg, Deepak [1 ]
Sidhu, Jagpreet [2 ]
Rani, Shalli [1 ]
机构
[1] Chitkara Univ, Inst Engn & Technol, Dept Comp Sci & Engn, Rajpura, Punjab, India
[2] Jaypee Univ Informat Technol, Dept Comp Sci & Engn & Informat Technol, Solan, India
关键词
cloud computing; security; survey; effective citation; EC; effective impact factor; EIF; vulnerabilities; threats; attacks; RESOURCE-ALLOCATION; INTRUSION DETECTION; ENERGY-EFFICIENT; DATA POSSESSION; KEYWORD SEARCH; ENCRYPTED DATA; ACCESS-CONTROL; DATA-STORAGE; PRIVACY; MANAGEMENT;
D O I
10.1504/IJAHUC.2020.106644
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become an emerging technology which has huge impact. Existing security algorithms cannot meet the needs of cloud computing users as security issues have become increasingly prominent, becoming an important factor restricting the development of cloud computing. Research community has immensely focused on developing and optimising security techniques to overcome this hurdle in cloud. Due to huge literature it becomes difficult to comprehend overall structure and advancements. This domain needs an analytic approach to completely understand the problem domain that is why this article represents same in specific context of security. Further, a notion on security issues in cloud computing with respect to vulnerabilities, threats and attacks is discussed. Paper also proposed two research evaluation parameters that are effective citation and effective impact factor for better appreciation. Article also analyses patterns, trends and other factors for directing research activities. Finally, a global research trends on security domain are evaluated and analysed.
引用
收藏
页码:133 / 154
页数:22
相关论文
共 114 条
[1]   Effect of anti-malware software on infectious nodes in cloud environment [J].
Abazari, Farzaneh ;
Analoui, Morteza ;
Takabi, Hassan .
COMPUTERS & SECURITY, 2016, 58 :139-148
[2]   An innovative privacy preserving technique for incremental datasets on cloud computing [J].
Aldeen, Yousra Abdul Alsahib S. ;
Salleh, Mazleena ;
Aljeroudi, Yazan .
JOURNAL OF BIOMEDICAL INFORMATICS, 2016, 62 :107-116
[3]   Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers [J].
Alhanahnah, Mohannad ;
Bertok, Peter ;
Tari, Zahir ;
Alouneh, Sahel .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 :488-499
[4]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[5]  
[Anonymous], 2010, Informatics and Systems (INFOS), The 7th International Conference
[6]  
[Anonymous], IEEE ACCESS
[7]  
[Anonymous], 2018, WIRELESS PERS COMMUN
[8]   Anonymous end-to-end communications in adversarial mobile clouds [J].
Ardagna, Claudio A. ;
Ariyapala, Kanishka ;
Conti, Mauro ;
Pinotti, Cristina M. ;
Stefa, Julinda .
PERVASIVE AND MOBILE COMPUTING, 2017, 36 :57-67
[9]   From Security to Assurance in the Cloud: A Survey [J].
Ardagna, Claudio A. ;
Asal, Rasool ;
Damiani, Ernesto ;
Quang Hieu Vu .
ACM COMPUTING SURVEYS, 2015, 48 (01)
[10]  
Baig MA, 2018, 2018 5TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (UPCON), P268