A Survey on the Security of Cloud Computing

被引:0
作者
Alhenaki, Lubna [1 ]
Alwatban, Alaa [1 ]
Alamri, Bashaer [1 ]
Alarifi, Noof [1 ]
机构
[1] King Saud Univ, Comp Sci Dept, Coll Comp Sci & Informat Sci, Riyadh, Saudi Arabia
来源
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS) | 2019年
关键词
Cloud Computing; Information Security; Cyber-attacks; Threats; INTRUSION DETECTION; ISSUES; ATTACKS; PREVENTION; TAXONOMY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Within the recent decade, major innovations in technology have emerged, that potentially add more convenience to daily life practices not only on an enterprise level but on an individual level as well. Cloud Computing technology has witnessed significant advances in its implementation and become widely adopted by either private or public sectors. It was obvious recently that a lot of organizations and enterprises are transferring their workloads to the cloud. However, security is a major concern for the cloud computing services which is based on Internet connection that makes it vulnerable to multiple types of attacks. Even though that the security measures implemented over cloud computing are developing every passing year, Security still a challenge. In this paper, we conducted a survey study on cloud computing and addressed different types of attacks and possible threats to this emerging technology, as well as protection methods and existing solutions to such attacks.
引用
收藏
页数:7
相关论文
共 41 条
  • [1] Aawadallah N., 2015, INT J RECENT INNOVAT, V3, P2393, DOI [10.17762/ijritcc2321-8169.1504133, DOI 10.17762/IJRITCC2321-8169.1504133]
  • [2] Akbarabadi A., OVERVIEW METHODS DET, P6
  • [3] Amara N., 2017, 2017 INT C CYB EN DI
  • [4] Anitha R., 2013, DATA STORAGE SECURIT, P5
  • [5] [Anonymous], 2012, International Journal of Future Computer and Communication
  • [6] [Anonymous], EFFECTIVE RESOURCE M
  • [7] [Anonymous], 2012, REP OPIN, DOI DOI 10.7537/MARSROJ041012.07
  • [8] [Anonymous], INT C COMP COMM AUT
  • [9] [Anonymous], OVERVIEW ATTACKS CLO
  • [10] [Anonymous], 2010, INFORM SECURITY S AF, DOI DOI 10.1109/ISSA.2010.5588290