Cloud security issues and challenges: A survey

被引:241
作者
Singh, Ashish [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Cloud computing; Cloud framework; Cloud security; Cloud security challenges; Cloud security issues; OF-THE-ART; INTRUSION DETECTION; PRIVACY; STORAGE; INTROSPECTION; COMPUTATION; ACCESS;
D O I
10.1016/j.jnca.2016.11.027
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing provides on demand services over the Internet with the help of a large amount of virtual storage. The main features of cloud computing is that the user does not have any setup of expensive computing infrastructure and the cost of its services is less. In the recent years, cloud computing integrates with the industry and many other areas, which has been encouraging the researcher to research on new related technologies. Due to the availability of its services & scalability for computing processes individual users and organizations transfer their application, data and services to the cloud storage server. Regardless of its advantages, the transformation of local computing to remote computing has brought many security issues and challenges for both consumer and provider. Many cloud services are provided by the trusted third party which arises new security threats. The cloud provider provides its services through the Internet and uses many web technologies that arise new security issues. This paper discussed about the basic features of the cloud computing, security issues, threats and their solutions. Additionally, the paper describes several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks. The paper also discusses a lot of open research issues related to the cloud security.
引用
收藏
页码:88 / 115
页数:28
相关论文
共 195 条
[91]  
Jaber AN, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2013), P179, DOI 10.1109/ICCSCE.2013.6719955
[92]   Security in Multi-Tenancy Cloud [J].
Jasti, Amarnath ;
Shah, Payal ;
Nagaraj, Rajeev ;
Pendse, Ravi .
44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, :35-41
[93]  
Jensen M., 2011, Proceedings of the 2011 IEEE 35th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2011). Volume II: Workshops, P392, DOI 10.1109/COMPSACW.2011.72
[94]   The impact of flooding attacks on network-based services [J].
Jensen, Meiko ;
Gruschka, Nils ;
Luttenberger, Norbert .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :509-+
[95]   A survey of attacks on web services: Classification and countermeasures [J].
Jensen, Meiko ;
Gruschka, Nils ;
Herkenhoener, Ralph .
COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2009, 24 (04) :185-197
[96]   On Technical Security Issues in Cloud Computing [J].
Jensen, Meiko ;
Schwenk, Joerg ;
Gruschka, Nils ;
Lo Iacono, Luigi .
CLOUD: 2009 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2009, :109-+
[97]   The Accountability Problem of Flooding Attacks in Service-Oriented Architectures [J].
Jensen, Meiko ;
Schwenk, Joerg .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :25-32
[98]  
Ji S., 2012, ADV DIFFER EQU, V2012, P1, DOI DOI 10.1016/J.CAGE0.2012.01.004
[99]  
John C.Roberts., 2011, Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD '11, P15, DOI 10.1145/2047456.2047458
[100]  
Jun Xu, 2015, Cloud Computing and Security. First International Conference, ICCCS 2015. Revised Selected Papers: LNCS 9483, P218, DOI 10.1007/978-3-319-27051-7_19