Cloud Computing security classifications and taxonomies: a comprehensive study and comparison

被引:1
|
作者
Tissir, Najat [1 ]
El Kafhali, Said [2 ]
Aboutabit, Nourddine [1 ]
机构
[1] Sultan Moulay Slimane Univ, Proc Engn Comp Sci & Math Lab, Natl Sch Appl Sci, Khouribga, Morocco
[2] Hassan First Univ Settat, Comp Networks Mobil & Modeling Lab IR2M, Fac Sci & Tech, BP 577, Settat 26000, Morocco
来源
PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20) | 2020年
关键词
Cloud Computing; Taxonomy; Classification; Threat; Attacks; ENERGY-CONSUMPTION; PERFORMANCE;
D O I
10.1109/CloudTech49835.2020.9365884
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud's attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.
引用
收藏
页码:264 / 269
页数:6
相关论文
共 50 条
  • [1] State-of-the-art Cloud Computing Security Taxonomies - A classification of security challenges in the present cloud computing environment
    Srinivasan, Madhan Kumar
    Sarukesi, K.
    Rodrigues, Paul
    Manoj, Sai M.
    Revathy, P.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 470 - 476
  • [2] A Review and a Classifications of Mobile Cloud Computing Security Issues
    Al Ladan, Mohamad Ibrahim
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 214 - 222
  • [3] A Comprehensive Survey on Security in Cloud Computing
    Ramachandra, Gururaj
    Iftikhar, Mohsin
    Khan, Farrukh Aslam
    14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 465 - 472
  • [4] A COMPREHENSIVE REVIEW ON CLOUD COMPUTING SECURITY
    Shanmugasundaram, G.
    Aswini, V.
    Suganya, G.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [5] Comparison of Security Algorithms in Cloud Computing
    Devkota, Dinesh
    Ghimire, Prashant
    Burris, John
    Alkadi, Ihssan
    2015 IEEE AEROSPACE CONFERENCE, 2015,
  • [6] A Comprehensive study on Cloud computing
    Ananthi, S.
    HariGanesh, S.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [7] A Comparison Study of Information Security Risk Management Frameworks in Cloud Computing
    Alnuem, Mohammed
    Alrumaih, Hala
    Al-Alshaikh, Halah
    CLOUD COMPUTING 2015: THE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION, 2015, : 103 - 109
  • [8] An Effective Security Comparison Protocol in Cloud Computing
    Chen, Yuling
    Tao, Junhong
    Li, Tao
    Cai, Jiangyuan
    Ren, Xiaojun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 5141 - 5158
  • [9] A Survey of Cloud Computing Taxonomies: Rationale and Overview
    Polash, Fahad
    Abuhussein, Abdullah
    Shiva, Sajjan
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 459 - 465
  • [10] Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things
    Nag, Anindya
    Hassan, Md. Mehedi
    Das, Ayontika
    Sinha, Anurag
    Chand, Nisarga
    Kar, Anwesha
    Sharma, Vandana
    Alkhayyat, Ahmed
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)