Security in cloud computing: Opportunities and challenges

被引:406
作者
Ali, Mazhar [1 ,3 ]
Khan, Samee U. [1 ]
Vasilakos, Athanasios V. [2 ]
机构
[1] N Dakota State Univ, Fargo, ND 58102 USA
[2] Kuwait Univ, Kuwait, Kuwait
[3] COMSATS Inst Informat Technol, Abbottabad, Pakistan
基金
美国国家科学基金会;
关键词
Cloud computing; Multi-tenancy; Security; Virtualization; Web services; VIRTUALIZATION SECURITY; ACCESS-CONTROL; PRIVACY; STORAGE; ISSUES; ARCHITECTURE; ENCRYPTION; HYPERVISOR; MODELS; SCHEME;
D O I
10.1016/j.ins.2015.01.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user's assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues. Furthermore, a brief view of security vulnerabilities in the mobile cloud computing are also highlighted. In the end, the discussion on the open issues and future research directions is also presented. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:357 / 383
页数:27
相关论文
共 127 条
  • [51] Ibrahim A. S., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P113, DOI 10.1109/ICNSS.2011.6059967
  • [52] Jansen W.A., 2011, Proceedings of the 44th Hawaii International Conference on System Sciences, P1, DOI [DOI 10.1109/HICSS.2011.103, 10.1109/HICSS.2011.103]
  • [53] ImageElves: Rapid and Reliable System Updates in the Cloud
    Jeswani, Deepak
    Verma, Akshat
    Jayachandran, Praveen
    Bhattacharya, Kamal
    [J]. 2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 390 - 399
  • [54] Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
    Jung, Taeho
    Li, Xiang-Yang
    Wan, Zhiguo
    Wan, Meng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 190 - 199
  • [55] BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Ali, Mazhar
    Madani, Sajjad A.
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (02) : 946 - 976
  • [56] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 68 (02) : 624 - 651
  • [57] Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Khan, Atta ur Rehman
    Ali, Mazhar
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 66 (03) : 1687 - 1706
  • [58] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [59] A Survey of Mobile Cloud Computing Application Models
    Khan, Atta Ur Rehman
    Othman, Mazliza
    Madani, Sajjad Ahmad
    Khan, Samee Ullah
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) : 393 - 413
  • [60] Latif R., 2014, FUTURE INFORM TECHNO, P285, DOI DOI 10.1007/978-3-642-40861-8