On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

被引:73
作者
Kumar, Rakesh [1 ]
Goyal, Rinkaj [1 ]
机构
[1] Guru Gobind Singh GGS Indraprastha Univ, Univ Sch Informat Commun & Technol, New Delhi 110078, India
关键词
Cloud computing; Security in cloud; Cloud security trust model; Cloud security challenges; Cloud security requirements threats vulnerabilities countermeasures; INTRUSION DETECTION; BIG DATA; INTEGRITY VERIFICATION; ACCESS-CONTROL; PREVENTION SYSTEM; DDOS ATTACKS; DATA-STORAGE; TRUST MODEL; SHARED DATA; CHALLENGES;
D O I
10.1016/j.cosrev.2019.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The world is witnessing a phenomenal growth in the cloud enabled services and is expected to grow further with the improved technological innovations. However, the associated security and privacy challenges inhibit its widespread adoption, and therefore require further exploration. Researchers from academia, industry, and standards organizations have provided potential solutions to these challenges in the previously published studies. The narrative review presented in this survey, however, provides an integrationist end-to-end mapping of cloud security requirements, identified threats, known vulnerabilities, and recommended countermeasures, which seems to be not presented before at one place. Additionally, this study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping. Further, it highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things (IoT), Software Defined Network (SDN) and Network Function Virtualization (NFV). (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 48
页数:48
相关论文
共 478 条
[1]   Forensic-by-Design Framework for Cyber-Physical Cloud Systems [J].
Ab Rahman, Nurul Hidayah ;
Glisson, William Bradley ;
Yang, Yanjiang ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (01) :50-59
[2]   TRUST-CAP: A Trust Model for Cloud-based Applications [J].
AbdAllah, Eslam G. ;
Zulkernine, Mohammad ;
Gu, Yuan Xiang ;
Liem, Clifford .
2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, :584-589
[3]   A Novel Strong Password Generator for Improving Cloud Authentication [J].
Abdellaoui, Abderrahim ;
Khamlichi, Younes Idrissi ;
Chaoui, Habiba .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 :293-300
[4]   Big healthcare data: preserving security and privacy [J].
Abouelmehdi, Karim ;
Beni-Hessane, Abderrahim ;
Khaloufi, Hayat .
JOURNAL OF BIG DATA, 2018, 5 (01)
[5]   Cloud monitoring: A survey [J].
Aceto, Giuseppe ;
Botta, Alessio ;
de Donato, Walter ;
Pescape, Antonio .
COMPUTER NETWORKS, 2013, 57 (09) :2093-2115
[6]  
Aguiar D, 2014, BIOCOMPUT-PAC SYM, P3
[7]  
Ahmad I, 2017, 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), P193, DOI 10.1109/CSCN.2017.8088621
[8]   Lightweight secure storage model with fault-tolerance in cloud environment [J].
Ahmed, Muhra ;
Vu, Quang Hieu ;
Asal, Rasool ;
Al Muhairi, Hassan ;
Yeun, Chan Yeob .
ELECTRONIC COMMERCE RESEARCH, 2014, 14 (03) :271-291
[9]  
Ahuja S.P., 2012, NETWORK COMMUNICATIO, V1, P66
[10]   Digital Trust - Trusted Computing and Beyond A Position Paper [J].
Akram, Raja Naeem ;
Ko, Ryan K. L. .
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, :884-892