Security issues in cloud environments: a survey

被引:231
作者
Fernandes, Diogo A. B. [1 ]
Soares, Liliana F. B. [1 ]
Gomes, Joao V. [1 ]
Freire, Mario M. [1 ]
Inacio, Pedro R. M. [1 ]
机构
[1] Univ Beira Interior, Dept Comp Sci, Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Clouds; Cloud computing; Issues; Security; Survey; VIRTUAL MACHINE; FORENSIC EVIDENCE; TRUST; PRIVACY; ENCRYPTION; CHALLENGES; THREAT; MOBILE; MODEL;
D O I
10.1007/s10207-013-0208-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, the appealing features of cloud computing have been fueling the integration of cloud environments in the industry, which has been consequently motivating the research on related technologies by both the industry and the academia. The possibility of paying-as-you-go mixed with an on-demand elastic operation is changing the enterprise computing model, shifting on-premises infrastructures to off-premises data centers, accessed over the Internet and managed by cloud hosting providers. Regardless of its advantages, the transition to this computing paradigm raises security concerns, which are the subject of several studies. Besides of the issues derived from Web technologies and the Internet, clouds introduce new issues that should be cleared out first in order to further allow the number of cloud deployments to increase. This paper surveys the works on cloud security issues, making a comprehensive review of the literature on the subject. It addresses several key topics, namely vulnerabilities, threats, and attacks, proposing a taxonomy for their classification. It also contains a thorough review of the main concepts concerning the security state of cloud environments and discusses several open research topics.
引用
收藏
页码:113 / 170
页数:58
相关论文
共 289 条
[1]  
Ahuja S.P., 2012, NETWORK COMMUNICATIO, V1, P66
[2]  
Aihkisalo Tommi, 2012, 2012 IEEE Eighth World Congress on Services, P100, DOI 10.1109/SERVICES.2012.55
[3]  
Al-Aqrabi H., 2012, Proceedings of the 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2012), P124, DOI 10.1109/ISORCW.2012.31
[4]  
ALrayes MM, 2011, IEEE INT CONF NETWOR, P71, DOI 10.1109/ICON.2011.6168509
[5]   From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud [J].
Amoroso, Edward G. .
IEEE SECURITY & PRIVACY, 2013, 11 (01) :23-31
[6]  
[Anonymous], SECURITYFOCUS
[7]  
[Anonymous], PT 2 TOP BENEFITS CH
[8]  
[Anonymous], DIGIT INVESTIG
[9]  
[Anonymous], CSA BLOG
[10]  
[Anonymous], ASSESSING THE SECURI