Security Issues In Cloud Computing And Associated Alleviation Approaches

被引:4
作者
Hammami, Hamza [1 ]
Brahmi, Hanen [1 ]
Brahmi, Imen [2 ]
Ben Yahia, Sadok [2 ]
机构
[1] Higher Sch Comp Sci & Management Kairouan, Kairouan, Tunisia
[2] Fac Sci Tunis, Tunis, Tunisia
来源
2016 12TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS) | 2016年
关键词
Cloud Computing; Online Services; Remote Computing; Storage; Computing Data; Costs; Security; Sensitive Data; AUTHENTICATION;
D O I
10.1109/SITIS.2016.125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is the fruit of recent developments in information technology, it provides access to many online services as well as remote computing resources as needed. To be more specific, cloud computing stands today as a satisfactory answer to the problem of storage and computing of data encountered by companies. It provides treatment and accommodation of their digital information via a fully outsourced infrastructure. The latter enables users to benefit from many online services without worrying about the technical aspects of their use. In the meanwhile, it limits costs generated by the management of these data. However, this advanced technology has immediately highlighted many serious security troubles. The major issue that prevents many companies to migrate to the cloud is the security of sensitive data hosted in the provider. Actually, the security problem related to this technology has slowed their expansion and restricted in a severe way their scope. The work in this paper deals to present a literature review of data security approaches for cloud computing, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve.
引用
收藏
页码:758 / 765
页数:8
相关论文
共 47 条
[1]  
Abbasy M. Reza, 2011, IEEE WORLD C SERV
[2]  
Aldossary S., 2016, IJACSA INT J ADV COM, V7
[3]  
[Anonymous], 2015, P 2015 3 INT C COMP
[4]  
EL MAKKAOUI K., 2016, Journal of Theoretical and Applied Information Technology, V84
[5]   Mobile cloud computing: A survey [J].
Fernando, Niroshinie ;
Loke, Seng W. ;
Rahayu, Wenny .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01) :84-106
[6]  
Goyal Sumit, 2014, International Journal of Computer Network and Information Security, V6, P20, DOI 10.5815/ijcnis.2014.03.03
[7]   Understanding Cloud Computing Vulnerabilities [J].
Grobauer, Bernd ;
Walloschek, Tobias ;
Stoecker, Elmar .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :50-57
[8]  
Hassan N., 2016, INT J COMPUTER SCI I, V14, P52
[9]   Facial Micro-Expression Recognition using Spatiotemporal Local Binary Pattern with Integral Projection [J].
Huang, Xiaohua ;
Wang, Su-Jing ;
Zhao, Guoying ;
Pietikainen, Matti .
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOP (ICCVW), 2015, :1-9
[10]  
Jansen W.A., 2011, Proceedings of the 44th Hawaii International Conference on System Sciences, P1, DOI DOI 10.1109/HICSS.2011.103