Security in cloud computing: Opportunities and challenges

被引:406
作者
Ali, Mazhar [1 ,3 ]
Khan, Samee U. [1 ]
Vasilakos, Athanasios V. [2 ]
机构
[1] N Dakota State Univ, Fargo, ND 58102 USA
[2] Kuwait Univ, Kuwait, Kuwait
[3] COMSATS Inst Informat Technol, Abbottabad, Pakistan
基金
美国国家科学基金会;
关键词
Cloud computing; Multi-tenancy; Security; Virtualization; Web services; VIRTUALIZATION SECURITY; ACCESS-CONTROL; PRIVACY; STORAGE; ISSUES; ARCHITECTURE; ENCRYPTION; HYPERVISOR; MODELS; SCHEME;
D O I
10.1016/j.ins.2015.01.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user's assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues. Furthermore, a brief view of security vulnerabilities in the mobile cloud computing are also highlighted. In the end, the discussion on the open issues and future research directions is also presented. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:357 / 383
页数:27
相关论文
共 127 条
  • [11] [Anonymous], P 10 ANN ACM WORKSH
  • [12] [Anonymous], 2012, IEEE IFIP INT C DEP, DOI DOI 10.1109/DSN.2012.6263958
  • [13] Aslam M., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P869, DOI 10.1109/TrustCom.2012.256
  • [14] Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
  • [15] Bhadauria R., 2013, ARXIV13080824
  • [16] Trends and Challenges in Cloud Datacenters
    Bilal, Kashif
    Malik, Saif Ur Rehman
    Khan, Samee U.
    Zomaya, Albert Y.
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (01) : 10 - 20
  • [17] Bobba R, 2009, LECT NOTES COMPUT SC, V5789, P587, DOI 10.1007/978-3-642-04444-1_36
  • [18] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [19] Optimization of Resource Provisioning Cost in Cloud Computing
    Chaisiri, Sivadon
    Lee, Bu-Sung
    Niyato, Dusit
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 164 - 177
  • [20] Chandramouli Ramaswamy., 2014, SECURE CLOUD COMPUTI, P1, DOI [DOI 10.1007/978-1-4614-9278-8_1, 10.1007/978-1-4614-9278-8_1]