Security in cloud computing: Opportunities and challenges

被引:406
作者
Ali, Mazhar [1 ,3 ]
Khan, Samee U. [1 ]
Vasilakos, Athanasios V. [2 ]
机构
[1] N Dakota State Univ, Fargo, ND 58102 USA
[2] Kuwait Univ, Kuwait, Kuwait
[3] COMSATS Inst Informat Technol, Abbottabad, Pakistan
基金
美国国家科学基金会;
关键词
Cloud computing; Multi-tenancy; Security; Virtualization; Web services; VIRTUALIZATION SECURITY; ACCESS-CONTROL; PRIVACY; STORAGE; ISSUES; ARCHITECTURE; ENCRYPTION; HYPERVISOR; MODELS; SCHEME;
D O I
10.1016/j.ins.2015.01.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user's assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues. Furthermore, a brief view of security vulnerabilities in the mobile cloud computing are also highlighted. In the end, the discussion on the open issues and future research directions is also presented. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:357 / 383
页数:27
相关论文
共 127 条
  • [1] Abbas A., 2014, IEEE J BIOMED HLTH I
  • [2] Abbas A., 2014, FUTURE GENER COMPUT
  • [3] Agrawal R., 2011, INDICTHREADS COM
  • [4] Alhamazani K., 2013, ARXIV13126170
  • [5] SeDaSC: Secure Data Sharing in Clouds
    Ali, Mazhar
    Dhamotharan, Revathi
    Khan, Eraj
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Li, Keqin
    Zomaya, Albert Y.
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 395 - 404
  • [6] Alowolodu O., 2013, INT J COMPUT APPL, V66
  • [7] Anala MR, 2013, 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P243, DOI 10.1109/ICACCI.2013.6637178
  • [8] [Anonymous], 2010, BROWSER SECURITY HDB
  • [9] [Anonymous], 2013, P 6 INT C SEC INF NE
  • [10] [Anonymous], ADV COMPUTER SCI ITS