A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing

被引:39
作者
Jangjou, Mehrdad [1 ]
Sohrabi, Mohammad Karim [1 ]
机构
[1] Islamic Azad Univ, Semnan Branch, Dept Comp Engn, Semnan, Iran
关键词
INTRUSION DETECTION; RISK-ASSESSMENT; ISSUES; IAAS; TAXONOMY; PAAS; PERFORMANCE; INFRASTRUCTURE; PREVENTION; ATTACKS;
D O I
10.1007/s11831-022-09708-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Conducting enterprise distributed computing and providing facilities such as data storage and resource sharing, along with the provision of cheap, easy, and flexible services, have led to the increasing popularity of cloud computing. Data migration and applications outside the administrative domain of customers cause numerous security challenges in cloud computing. Investigating the security challenges, vulnerabilities, and threats in different network layers is important due to the significant role of security in cloud computing. In this paper, the existing challenges of different network layers in cloud computing will be identified, analyzed, and classified. Categorizing security challenges in cloud computing from the network layers' perspective considering service models, cloud service providers and cloud users leads to useful methods for system designers to provide a systematic approach for a deeper understanding and then, detecting and preventing security risks. Emerging solutions and preventive methods that may potentially reduce vulnerabilities in various network layers are also introduced in this paper.
引用
收藏
页码:3587 / 3608
页数:22
相关论文
共 50 条
  • [31] Cloud Computing Security and Future
    Kopacz, Patrick
    Chowdhury, Md Minhaz
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 264 - 269
  • [32] A note on cloud computing security
    Garg, Deepak
    Sidhu, Jagpreet
    Rani, Shalli
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 33 (03) : 133 - 154
  • [33] Comprehensive Security Integrated Model and Ontology within Cloud Computing
    Liu, Fong-Hao
    Lo, Hsiang-Fu
    Chen, Liang-Chu
    Lee, Wei-Tsong
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06): : 935 - 945
  • [34] A Comprehensive Review of Soft Computing Enabled Techniques for IoT Security: State-of-the-Art and Challenges Ahead
    Parabrahmachari, Sriram
    Narayanasamy, Srinivasan
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 131 - 146
  • [35] Using Cloud Computing to Implement a Security Overlay Network
    Salah, Khaled
    Alcaraz Calero, Jose M.
    Zeadally, Sherali
    Al-Mulla, Sameera
    Alzaabi, Mohammed
    IEEE SECURITY & PRIVACY, 2013, 11 (01) : 44 - 53
  • [36] Data Security Challenges and Solutions in Cloud Computing: Critical Review
    Al-Otaibi, Shuruq Zayed
    COMMUNICATIONS IN MATHEMATICS AND APPLICATIONS, 2022, 13 (02): : 795 - 806
  • [37] Cloud computing security: Attacks, threats, risk and solutions
    Kaushik S.
    Gandhi C.
    Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) : 50 - 71
  • [38] Designing an efficient security framework for detecting intrusions in virtual network of cloud computing
    Patil, Rajendra
    Dudeja, Harsha
    Modi, Chirag
    COMPUTERS & SECURITY, 2019, 85 : 402 - 422
  • [39] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Kiraz, Mehmet Sabir
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 731 - 760
  • [40] Investigating Security Issues in Cloud Computing
    Moyo, Tumpe
    Bhogal, Jagdev
    2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 141 - 146