A survey on cloud computing security: Issues, threats, and solutions

被引:231
作者
Singh, Saurabh [1 ]
Jeong, Young-Sik [2 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
[2] Dongguk Univ, Dept Multimedia Engn, Seoul 04620, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud computing; Security; Embedded system; Resource pooling; PRIVACY; VIRTUALIZATION; ARCHITECTURE; CHALLENGES; PROTECTION; TRUST; ERA;
D O I
10.1016/j.jnca.2016.09.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand services to consumers with greater flexibility in a cost effective manner. While moving towards the concept of on demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability. This survey present a comprehensive overview of the security issues for different factors affecting cloud computing. Furthermore, a detailed discussion on several key topics regarding embedded system, application, storage system, clustering related issues and many more. This paper works on some public cloud and private cloud authorities as well as related security concerns. Additionally, it encompasses the requirements for better security management and suggests 3-tier security architecture. Open issues with discussion in which some new security concepts and recommendations are also provided. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:200 / 222
页数:23
相关论文
共 139 条
  • [91] Survey on various data integrity attacks in cloud environment and the solutions
    [J]. 1600, IEEE Computer Society : 1076 - 1081
  • [92] Metzger A., 2012, 2012 Proceedings of the First International Workshop on "European Software Services and Systems Research - Results and Challenges" (S-Cube 2012), P1, DOI 10.1109/S-Cube.2012.6225501
  • [93] A survey on security issues and solutions at different layers of Cloud computing
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Avi
    Rajarajan, Muttukrishnan
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 63 (02) : 561 - 592
  • [94] Mowbray M., 2009, Proceedings of the Fourth International (ICST) Conference on COMmunication System softWAre and middleware, P5
  • [95] Investigating Security Issues in Cloud Computing
    Moyo, Tumpe
    Bhogal, Jagdev
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 141 - 146
  • [96] Security transparency: the next frontier for security research in the cloud
    Ouedraogo, Moussa
    Mignon, Severine
    Cholez, Herve
    Furnell, Steven
    Dubois, Eric
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2015, 4
  • [97] Pearson S., 2013, PRIVACY SECURITY CLO, P3, DOI DOI 10.1007/978-1-4471-4189-1
  • [98] Perez-Botero D., 2013, P 2013 INT WORKSHOP, P3, DOI DOI 10.1145/2484402.2484406
  • [99] Trends and challenges in operating systemsufrom parallel computing to cloud computing
    Polze, Andreas
    Troeger, Peter
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (07) : 676 - 686
  • [100] Popovic Kresimir, 2010, 2010 33rd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), P344