A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing

被引:45
作者
Jangjou, Mehrdad [1 ]
Sohrabi, Mohammad Karim [1 ]
机构
[1] Islamic Azad Univ, Semnan Branch, Dept Comp Engn, Semnan, Iran
关键词
INTRUSION DETECTION; RISK-ASSESSMENT; ISSUES; IAAS; TAXONOMY; PAAS; PERFORMANCE; INFRASTRUCTURE; PREVENTION; ATTACKS;
D O I
10.1007/s11831-022-09708-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Conducting enterprise distributed computing and providing facilities such as data storage and resource sharing, along with the provision of cheap, easy, and flexible services, have led to the increasing popularity of cloud computing. Data migration and applications outside the administrative domain of customers cause numerous security challenges in cloud computing. Investigating the security challenges, vulnerabilities, and threats in different network layers is important due to the significant role of security in cloud computing. In this paper, the existing challenges of different network layers in cloud computing will be identified, analyzed, and classified. Categorizing security challenges in cloud computing from the network layers' perspective considering service models, cloud service providers and cloud users leads to useful methods for system designers to provide a systematic approach for a deeper understanding and then, detecting and preventing security risks. Emerging solutions and preventive methods that may potentially reduce vulnerabilities in various network layers are also introduced in this paper.
引用
收藏
页码:3587 / 3608
页数:22
相关论文
共 69 条
[1]   Heuristic-based load-balancing algorithm for IaaS cloud [J].
Adhikari, Mainak ;
Amgoth, Tarachand .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 81 :156-165
[2]  
Ahmim A, 2020, TAXONOMY SUPERVISED, P1
[3]  
Al Mudawi N, 2020, INT J ADV COMPUT SC, V11, P7
[4]   Forensics framework for cloud computing [J].
Alex, M. Edington ;
Kishore, R. .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 60 :193-205
[5]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[6]  
Almutairy M, 2019, TAXONOMY VIRTUALIZAT, P1
[7]  
Amundrud Y., 2017, P IMECHE PART J RISK, V231, P3
[8]   The risk concept-historical and recent development trends [J].
Aven, Terje .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2012, 99 :33-44
[9]   Security Algorithms for Cloud Computing [J].
Bhardwaj, Akashdeep ;
Subrahmanyam, G. V. B. ;
Avasthi, Vinay ;
Sastry, Hanumat .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 :535-542
[10]  
Brandao P, 2019, UIDHIS000572019, P1