Complying with Security Requirements in Cloud Storage Systems

被引:0
|
作者
Roman, Rodrigo [1 ]
Felipe, Miguel Rodel [2 ]
Gene, Phua Eu [2 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Data Storage Inst, Singapore, Singapore
关键词
Cloud computing; cloud storage; security;
D O I
10.17706/jcp.11.3.201-206
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
One of the necessary steps to ensure the security of cloud storage systems is to adequately protect the infrastructure itself - the hardware and software that implements the storage services. Starting from an analysis of the security requirements that affect these storage systems, this paper studies the different strategies and approaches that are currently used to fulfill such requirements. The goal of this paper is twofold. Firstly, we aim to analyze the security components that should be used to provide a basic level of protection to storage systems, examining the actual technologies that are used to construct them. Secondly, we aim to identify gaps in the provisioning of security services, highlighting any areas that need of further research.
引用
收藏
页码:201 / 206
页数:6
相关论文
共 50 条
  • [1] Complying With Data Handling Requirements in Cloud Storage Systems
    Henze, Martin
    Matzutt, Roman
    Hiller, Jens
    Muehmer, Erik
    Ziegeldorf, Jan Henrik
    van der Giet, Johannes
    Wehrle, Klaus
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1661 - 1674
  • [2] Quantifying Satisfaction of Security Requirements of Cloud Software Systems
    Nhlabatsi, Armstrong
    Khan, Khaled M. D.
    Hong, Jin B.
    Kim, Dong Seong
    Fernandez, Rachael
    Fetais, Noora
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 426 - 444
  • [3] Analysis of Security Components in Cloud Storage Systems
    Roman, Rodrigo
    Felipe, Miguel Rodel
    Gene, Phua Eu
    Zhou, Jianying
    2012 DIGEST ASIA-PACIFIC MAGNETIC RECORDING CONFERENCE (APMRC), 2012,
  • [4] Research on Cloud Storage Security
    Chen, Wei
    Zhao, Yuelong
    Long, Saiqin
    Xie, Xiaoling
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3068 - +
  • [5] Security Challenges in Cloud Storage
    Yahya, F.
    Chang, V.
    Walters, R. J.
    Wills, G. B.
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 1051 - 1056
  • [6] Cloud Based C4I Systems: Security Requirements and Concerns
    Fazal-e-Amin
    Alghamdi, Abdullah S.
    Ahmad, Iftikhar
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 75 - 80
  • [7] An Assessment of Security Requirements Compliance of Cloud Providers
    Bhensook, Nuntapun
    Senivongse, Twittie
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [8] Security Requirements in a Federated Cloud Networking Architecture
    Massonet, Philippe
    Levin, Anna
    Celesti, Antonio
    Villari, Massimo
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
  • [9] Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
    Rodrigues, Joel J. P. C.
    de la Torre, Isabel
    Fernandez, Gonzalo
    Lopez-Coronado, Miguel
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2013, 15 (08)
  • [10] Vulnerabilities and storage security in Cloud Computing
    Derfouf, Mostapha
    Mimouni, Amina
    Eleuldj, Mohsine
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 295 - 299