Cloud computing and data security threats taxonomy: A review

被引:8
作者
Farsi, Mohammed [1 ]
Ali, Munwar [2 ]
Shah, Reehan Ali [3 ]
Wagan, Asif Ali [4 ]
Kharabsheh, Radwan [5 ]
机构
[1] Taibah Univ, Coll Comp Sci & Engn Yanbu, Yanbu, Saudi Arabia
[2] Shaheed Benazir Bhutto Univ, Dept Informat Technol, Shaheed Benazirabad, Sindh, Pakistan
[3] Islamia Univ Bahawalpur, Fac Engn, Dept Comp Syst Engn, Bahawalpur, Pakistan
[4] SMIU, Dept Comp Sci, Karachi, Pakistan
[5] Appl Sci Univ, Coll Adm Sci, Eker, Bahrain
关键词
Cloud computing; security threats; physical threats; virtual threats; security solution; CHALLENGES;
D O I
10.3233/JIFS-179539
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is considered as a new paradigm shift in distributed computing. Due to its increasing popularity, it has gotten increasing attention in the research community. In the last few years, the usage of cloud computing has increased because of its user-friendly services. However, as the number of users increases in the cloud, the service complexity and new security challenges take place. Data security is one of the major issues, which blocks users from adopting cloud. In this paper, we conducted a detailed literature review divided into two categories i.e. Single/multi-cloud data security issues and data security techniques used to secure the data in cloud virtual environment. We worked hard to find out the limitations of the existing data security solutions. This effort may help the research community to analyze single and multi-cloud in more details.
引用
收藏
页码:2517 / 2527
页数:11
相关论文
共 50 条
[31]   A Security Threats Measurement Model for Reducing Cloud Computing Security Risk [J].
Lai, Sen-Tarng ;
Leu, Fang-Yie .
2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, :414-419
[32]   Data Security in Cloud Computing [J].
Sathyanarayana, T. V. ;
Sheela, L. Mary Immaculate .
2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, :822-827
[33]   Data security in cloud computing [J].
Meng, Du .
PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, :810-813
[34]   Data Security in Cloud Computing [J].
Albugmi, Ahmed ;
Alassafi, Madini O. ;
Walters, Robert ;
Wills, Gary .
2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, :55-59
[35]   Review of cloud computing security [J].
School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China .
Tien Tzu Hsueh Pao, 2013, 2 (371-381) :371-381
[36]   Taxonomy for Identification of Security Issues in Cloud Computing Environments [J].
Ahmed, Monjur ;
Litchfield, Alan T. .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2018, 58 (01) :79-88
[37]   Security and Privacy in Cloud Computing: Technical Review [J].
Abdulsalam, Yunusa Simpa ;
Hedabou, Mustapha .
FUTURE INTERNET, 2022, 14 (01)
[38]   A REVIEW OF THREATS AND VULNERABILITIES TO CLOUD COMPUTING EXISTENCE [J].
Efozia, N. F. ;
Ariwa, E. ;
Asogwa, D. C. ;
Awonusi, O. ;
Anigbogu, S. O. .
2017 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH 2017), 2017, :197-204
[39]   A Short Review on Data Security and Privacy Issues in Cloud Computing [J].
Arjun, U. ;
Vinay, S. .
2016 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2016,
[40]   Data Security Challenges and Solutions in Cloud Computing: Critical Review [J].
Al-Otaibi, Shuruq Zayed .
COMMUNICATIONS IN MATHEMATICS AND APPLICATIONS, 2022, 13 (02) :795-806