A survey on cloud computing security: Issues, threats, and solutions

被引:231
作者
Singh, Saurabh [1 ]
Jeong, Young-Sik [2 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
[2] Dongguk Univ, Dept Multimedia Engn, Seoul 04620, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud computing; Security; Embedded system; Resource pooling; PRIVACY; VIRTUALIZATION; ARCHITECTURE; CHALLENGES; PROTECTION; TRUST; ERA;
D O I
10.1016/j.jnca.2016.09.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand services to consumers with greater flexibility in a cost effective manner. While moving towards the concept of on demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability. This survey present a comprehensive overview of the security issues for different factors affecting cloud computing. Furthermore, a detailed discussion on several key topics regarding embedded system, application, storage system, clustering related issues and many more. This paper works on some public cloud and private cloud authorities as well as related security concerns. Additionally, it encompasses the requirements for better security management and suggests 3-tier security architecture. Open issues with discussion in which some new security concepts and recommendations are also provided. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:200 / 222
页数:23
相关论文
共 139 条
  • [1] Ahmed A. S., 2012, Proceedings of the 2012 8th International Conference on Information Science and Digital Content Technology (ICIS and IDCTA), P218
  • [2] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [3] Anala MR, 2013, 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P243, DOI 10.1109/ICACCI.2013.6637178
  • [4] [Anonymous], P 7 ACM S INF COMP C
  • [5] [Anonymous], 2015, COMPUTER INFORM SCI, DOI DOI 10.1007/978-3-319-10509-3_9
  • [6] [Anonymous], INT J EMERG RES MANA
  • [7] [Anonymous], 2016, HDB RES MODERN CRYPT
  • [8] [Anonymous], 2013 P ITU KAL BUILD
  • [9] [Anonymous], INT J DIGIT CONTENT
  • [10] [Anonymous], EFFECTIVE RESOURCE M