A Classification and Characterization of Security Threats in Cloud Computing

被引:0
|
作者
Islam, Tariqul [1 ]
Manivannan, D. [1 ]
Zeadally, Sherali [2 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
关键词
Cloud Computing; Multi-tenancy; Privacy; Security; Threat; Virtualization; Vulnerability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security and privacy are the most critical issues that need to be addressed in designing a computing environment that is reliable and trustworthy. Like all other computing paradigms, Cloud Computing is no different. Since data and storage are outsourced to third party service providers, users lose direct control of data management and have to depend solely on the providers who may not always be dependable. This distinctive feature of Cloud Computing makes it susceptible to several security threats and vulnerabilities. Although some of the security issues such as network and virtualization security, authentication, access control, confidentiality, and integrity are not new to computing, the effect of such issues is exacerbated in cloud environment because of the unique features (e.g., multi-tenancy, data and resource sharing, virtualization, etc.) it possesses. In this paper, we classify and characterize the various security and privacy challenges associated with Cloud Computing.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [1] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [2] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [3] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [4] HOW SECURE IS YOUR CLOUD: CLASSIFICATION OF SECURITY THREATS AND COUNTERMEASURES WITHIN CLOUD COMPUTING?
    Almotiri, Sultan H.
    Al Ghamdi, Mohammed A.
    Saeed, Atif
    Shahid, Muhammad
    Masood, Khalid
    Nagra, Arfan Ali
    Asif, Muhammad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 228 - 241
  • [5] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [6] Security threats of virtualization in cloud computing
    [J]. Wang, H. (permutation@163.com), 1600, Huazhong University of Science and Technology (40):
  • [7] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [8] Security Threats in Cloud Computing Environments
    Lee, Kangchan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 25 - 32
  • [9] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [10] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    [J]. 2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111