Cloud computing and data security threats taxonomy: A review

被引:8
作者
Farsi, Mohammed [1 ]
Ali, Munwar [2 ]
Shah, Reehan Ali [3 ]
Wagan, Asif Ali [4 ]
Kharabsheh, Radwan [5 ]
机构
[1] Taibah Univ, Coll Comp Sci & Engn Yanbu, Yanbu, Saudi Arabia
[2] Shaheed Benazir Bhutto Univ, Dept Informat Technol, Shaheed Benazirabad, Sindh, Pakistan
[3] Islamia Univ Bahawalpur, Fac Engn, Dept Comp Syst Engn, Bahawalpur, Pakistan
[4] SMIU, Dept Comp Sci, Karachi, Pakistan
[5] Appl Sci Univ, Coll Adm Sci, Eker, Bahrain
关键词
Cloud computing; security threats; physical threats; virtual threats; security solution; CHALLENGES;
D O I
10.3233/JIFS-179539
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is considered as a new paradigm shift in distributed computing. Due to its increasing popularity, it has gotten increasing attention in the research community. In the last few years, the usage of cloud computing has increased because of its user-friendly services. However, as the number of users increases in the cloud, the service complexity and new security challenges take place. Data security is one of the major issues, which blocks users from adopting cloud. In this paper, we conducted a detailed literature review divided into two categories i.e. Single/multi-cloud data security issues and data security techniques used to secure the data in cloud virtual environment. We worked hard to find out the limitations of the existing data security solutions. This effort may help the research community to analyze single and multi-cloud in more details.
引用
收藏
页码:2517 / 2527
页数:11
相关论文
共 50 条
[21]   Research on security threats and Countermeasures for Cloud Computing [J].
Mi, Qing ;
Ni, Zhen-tao ;
Wang, Xiao-duan .
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 :322-327
[22]   Cloud computing security: a taxonomy, threat detection and mitigation techniques [J].
Rani P. ;
Singh S. ;
Singh K. .
International Journal of Computers and Applications, 2024, 46 (05) :348-361
[23]   Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature [J].
Ogwara, Noah Oghenefego ;
Petrova, Krassie ;
Yang, Mee Loong .
2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
[24]   Data Security in Cloud Computing Using Steganography: A Review [J].
AlKhamese, Aya Y. ;
Shabana, Wafaa R. ;
Hanafy, Ibrahim M. .
PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE 2019), 2019, :549-558
[25]   Review: An Evaluation of Major Threats in Cloud Computing Associated with Big Data [J].
Kaur, Kamalpreet ;
Syed, Ali ;
Mohammad, Azeem ;
Halgamuge, Malka N. .
2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, :373-377
[26]   An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman [J].
AlZadjali, Amira M. ;
Al-Badi, Ali H. ;
Ali, Saqib .
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, :423-428
[27]   Security Threats in Cloud Computing Models: Domains and Proposals [J].
Revoredo da Silva, Carlo Marcelo ;
Costa da Silva, Jose Lutiano ;
Rodrigues, Ricardo Batista ;
Medeiros Campos, Glaucia Melissa ;
do Nascimento, Leandro Marques ;
Garcia, Vinicius Cardoso .
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, :383-389
[28]   Cloud computing security: Attacks, threats, risk and solutions [J].
Kaushik S. ;
Gandhi C. .
Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) :50-71
[29]   Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework [J].
Khan, Nabeel ;
Al-Yasiri, Adil .
11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 :485-490
[30]   Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework [J].
Khan, Nabeel ;
Al-Yasiri, Adil .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (03) :50-64