Cloud computing and data security threats taxonomy: A review

被引:8
|
作者
Farsi, Mohammed [1 ]
Ali, Munwar [2 ]
Shah, Reehan Ali [3 ]
Wagan, Asif Ali [4 ]
Kharabsheh, Radwan [5 ]
机构
[1] Taibah Univ, Coll Comp Sci & Engn Yanbu, Yanbu, Saudi Arabia
[2] Shaheed Benazir Bhutto Univ, Dept Informat Technol, Shaheed Benazirabad, Sindh, Pakistan
[3] Islamia Univ Bahawalpur, Fac Engn, Dept Comp Syst Engn, Bahawalpur, Pakistan
[4] SMIU, Dept Comp Sci, Karachi, Pakistan
[5] Appl Sci Univ, Coll Adm Sci, Eker, Bahrain
关键词
Cloud computing; security threats; physical threats; virtual threats; security solution; CHALLENGES;
D O I
10.3233/JIFS-179539
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is considered as a new paradigm shift in distributed computing. Due to its increasing popularity, it has gotten increasing attention in the research community. In the last few years, the usage of cloud computing has increased because of its user-friendly services. However, as the number of users increases in the cloud, the service complexity and new security challenges take place. Data security is one of the major issues, which blocks users from adopting cloud. In this paper, we conducted a detailed literature review divided into two categories i.e. Single/multi-cloud data security issues and data security techniques used to secure the data in cloud virtual environment. We worked hard to find out the limitations of the existing data security solutions. This effort may help the research community to analyze single and multi-cloud in more details.
引用
收藏
页码:2517 / 2527
页数:11
相关论文
共 50 条
  • [1] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537
  • [2] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [3] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111
  • [4] Big Data in Vehicular Cloud Computing: Review, Taxonomy, and Security Challenges
    Alsayfi, Majed S.
    Dahab, Mohamed Y.
    Eassa, Fathy E.
    Salama, Reda
    Haridi, Seif
    Al-Ghamdi, Abdullah S.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2022, 28 (02) : 59 - 71
  • [5] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [6] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [7] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [8] Using data taxonomy to achieve security in cloud computing
    Ennajjar, Ibtissam
    Tabii, Youness
    Benkaddour, Abdelhamid
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2019, 60 (04) : 333 - 338
  • [9] A Multidimension Taxonomy of Insider Threats in Cloud Computing
    Alhanahnah, Mohannad J.
    Jhumka, Arshad
    Alouneh, Sahel
    COMPUTER JOURNAL, 2016, 59 (11): : 1612 - 1622
  • [10] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143