Cloud security issues and challenges: A survey

被引:241
作者
Singh, Ashish [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Cloud computing; Cloud framework; Cloud security; Cloud security challenges; Cloud security issues; OF-THE-ART; INTRUSION DETECTION; PRIVACY; STORAGE; INTROSPECTION; COMPUTATION; ACCESS;
D O I
10.1016/j.jnca.2016.11.027
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing provides on demand services over the Internet with the help of a large amount of virtual storage. The main features of cloud computing is that the user does not have any setup of expensive computing infrastructure and the cost of its services is less. In the recent years, cloud computing integrates with the industry and many other areas, which has been encouraging the researcher to research on new related technologies. Due to the availability of its services & scalability for computing processes individual users and organizations transfer their application, data and services to the cloud storage server. Regardless of its advantages, the transformation of local computing to remote computing has brought many security issues and challenges for both consumer and provider. Many cloud services are provided by the trusted third party which arises new security threats. The cloud provider provides its services through the Internet and uses many web technologies that arise new security issues. This paper discussed about the basic features of the cloud computing, security issues, threats and their solutions. Additionally, the paper describes several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks. The paper also discusses a lot of open research issues related to the cloud security.
引用
收藏
页码:88 / 115
页数:28
相关论文
共 195 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]  
Ahuja S.P., 2012, NETWORK COMMUNICATIO, V1, P66
[3]  
Aihkisalo Tommi, 2012, 2012 IEEE Eighth World Congress on Services, P100, DOI 10.1109/SERVICES.2012.55
[4]  
Al Morsy M., 2010, P APSEC 2010 CLOUD W
[5]  
AlFardan N., 2005, SECURITY RC4 TLS
[6]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[7]  
ALrayes MM, 2011, IEEE INT CONF NETWOR, P71, DOI 10.1109/ICON.2011.6168509
[8]   From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud [J].
Amoroso, Edward G. .
IEEE SECURITY & PRIVACY, 2013, 11 (01) :23-31
[9]  
Anala MR, 2013, 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P243, DOI 10.1109/ICACCI.2013.6637178
[10]  
[Anonymous], 2013, CISCO ANN SECURITY R