Cloud Computing Security: A Survey

被引:120
作者
Khalil, Issa M. [1 ]
Khreishah, Abdallah [2 ]
Azeem, Muhammad [3 ]
机构
[1] Qatar Fdn, QCRI, Doha, Qatar
[2] New Jersey Inst Technol, Newark Coll Engn, Dept Elect & Comp Engn, Newark, NJ 07102 USA
[3] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
关键词
cloud computing; cloud security; security vulnerabilities; threats; attacks; insider attackers;
D O I
10.3390/computers3010001
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.
引用
收藏
页码:1 / 35
页数:35
相关论文
共 96 条
[1]  
Albeshri A., 2010, Proceedings of the 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010), P641, DOI 10.1109/HPCC.2010.87
[2]  
ALrayes MM, 2011, IEEE INT CONF NETWOR, P71, DOI 10.1109/ICON.2011.6168509
[3]   An Entity-centric Approach for Privacy and Identity Management in Cloud Computing [J].
Angin, Pelin ;
Bhargava, Bharat ;
Ranchal, Rohit ;
Singh, Noopur ;
Linderman, Mark ;
Ben Othmane, Lotfi ;
Lilien, Leszek .
2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, :177-183
[4]  
[Anonymous], 1989, OXFORD ENGLISH DICT, V2nd
[5]   Defending against Web Application Vulnerabilities [J].
Antunes, Nuno ;
Vieira, Marco .
COMPUTER, 2012, 45 (02) :66-72
[6]  
Ates M., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P555, DOI 10.1109/ARES.2011.85
[7]   Determinating Timing Channels in Compute Clouds [J].
Aviram, Amittai ;
Hu, Sen ;
Ford, Bryan ;
Gummadi, Ramakrishna .
PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, :103-108
[8]  
Balen DO, 2011, PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), P341
[9]  
Behl A., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P217, DOI 10.1109/WICT.2011.6141247
[10]  
Bhadauria R., 2013, SURVEY SECURITY ISSU