Locking the sky: a survey on IaaS cloud security

被引:0
|
作者
Luis M. Vaquero
Luis Rodero-Merino
Daniel Morán
机构
[1] Hewlett-Packard Labs,
[2] LIP ENS Lyon,undefined
[3] Graal/Avalon Group,undefined
[4] INRIA,undefined
[5] U.N.E.D,undefined
来源
Computing | 2011年 / 91卷
关键词
Cloud computing; Security; IaaS; Multitenancy; 68M01; 68U35;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services’ time to market. Several concerns prevent players’ entry in the cloud; security is arguably the most relevant one. Many factors have an impact on cloud security, but it is its multitenant nature that brings the newest and more challenging problems to cloud settings. Here, we analyze the security risks that multitenancy induces to the most established clouds, Infrastructure as a service clouds, and review the literature available to present the most relevant threats, state of the art of solutions that address some of the associated risks. A major conclusion of our analysis is that most reported systems employ access control and encryption techniques to secure the different elements present in a virtualized (multitenant) datacenter. Also, we analyze which are the open issues and challenges to be addressed by cloud systems in the security field.
引用
收藏
页码:93 / 118
页数:25
相关论文
共 50 条
  • [1] Locking the sky: a survey on IaaS cloud security
    Vaquero, Luis M.
    Rodero-Merino, Luis
    Moran, Daniel
    COMPUTING, 2011, 91 (01) : 93 - 118
  • [2] IaaS Cloud Security
    Chavan, Pragati
    Patil, Pradeep
    Kulkarni, Gurudatt
    Sutar, Ramesh
    Belsare, Shrikant
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 549 - 553
  • [3] Cloud Security based on IaaS Model Prospective
    Kumar, Saroj
    Singh, Priya
    Siddiqui, Shadab
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2173 - 2178
  • [4] The Role and Security of Firewalls in IaaS Cloud Computing
    Cropper, Jordan
    Ullrich, Johanna
    Fruehwirt, Peter
    Weippl, Edgar
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 70 - 79
  • [5] IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors
    Chawki, El Balmany
    Ahmed, Asimi
    Zakariae, Tbatou
    15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 328 - 333
  • [6] Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud
    Singh, Gurjot Balraj
    Jaafar, Fehmi
    Butakov, Sergey
    2018 5TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2018, : 952 - 958
  • [7] Improving security in cloud by formal modeling of IaaS resources
    Amato, Flora
    Moscato, Francesco
    Moscato, Vincenzo
    Colace, Francesco
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 754 - 764
  • [8] Understanding Security Group Usage in a Public IaaS Cloud
    Jin, Cheng
    Srivastava, Abhinav
    Zhang, Zhi-Li
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [9] Agentless and Uniform Introspection for Various Security Services in IaaS Cloud
    Zhou, Huaizhe
    Ba, Haihe
    Ren, Jiangchun
    Wang, Yongjun
    Li, Yunshi
    Chen, Yong
    Wang, Zhiying
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 140 - 144
  • [10] Data Governance Cloud Security Checklist at Infrastructure as a Service (IaaS)
    Abu Saed, Kamariah
    Aziz, Norshakirah
    Abdulkadir, Said Jadid
    Aziz, Izzatdin A.
    Hassan, Noor Hafizah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (10) : 297 - 306