A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing

被引:39
|
作者
Jangjou, Mehrdad [1 ]
Sohrabi, Mohammad Karim [1 ]
机构
[1] Islamic Azad Univ, Semnan Branch, Dept Comp Engn, Semnan, Iran
关键词
INTRUSION DETECTION; RISK-ASSESSMENT; ISSUES; IAAS; TAXONOMY; PAAS; PERFORMANCE; INFRASTRUCTURE; PREVENTION; ATTACKS;
D O I
10.1007/s11831-022-09708-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Conducting enterprise distributed computing and providing facilities such as data storage and resource sharing, along with the provision of cheap, easy, and flexible services, have led to the increasing popularity of cloud computing. Data migration and applications outside the administrative domain of customers cause numerous security challenges in cloud computing. Investigating the security challenges, vulnerabilities, and threats in different network layers is important due to the significant role of security in cloud computing. In this paper, the existing challenges of different network layers in cloud computing will be identified, analyzed, and classified. Categorizing security challenges in cloud computing from the network layers' perspective considering service models, cloud service providers and cloud users leads to useful methods for system designers to provide a systematic approach for a deeper understanding and then, detecting and preventing security risks. Emerging solutions and preventive methods that may potentially reduce vulnerabilities in various network layers are also introduced in this paper.
引用
收藏
页码:3587 / 3608
页数:22
相关论文
共 50 条
  • [21] A Survey on Data Breach Challenges in Cloud Computing Security: Issues and Threats
    Barona, R.
    Anita, E. A. Mary
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [22] Security and privacy challenges in mobile cloud computing: Survey and way ahead
    Mollah, Muhammad Baqer
    Azad, Md. Abul Kalam
    Vasilakos, Athanasios
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 : 38 - 54
  • [23] Cloud Computing Security Challenges and Related Defensive Measures: A Survey and Taxonomy
    Chuka-Maduji N.
    Anu V.
    SN Computer Science, 2021, 2 (4)
  • [24] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [25] A survey of security and privacy challenges in cloud computing: Solutions and future directions
    Liu, Yuhong
    Sun, Yan
    Ryoo, Jungwoo
    Rizvi, Syed
    Vasilakos, Athanasios V.
    Journal of Computing Science and Engineering, 2015, 9 (03) : 119 - 133
  • [26] A COMPREHENSIVE REVIEW ON CLOUD COMPUTING SECURITY
    Shanmugasundaram, G.
    Aswini, V.
    Suganya, G.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [27] An Analysis of Security Challenges in Cloud Computing
    Parekh, Disha H.
    Sridaran, R.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 38 - 46
  • [28] Recent security challenges in cloud computing
    Subramanian, Nalini
    Jeyaraj, Andrews
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 28 - 42
  • [29] Security challenges in the distributed cloud computing
    Nwobodo, Ikechukwu
    Jahankhani, Hossein
    Edoh, Aloysius
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 38 - 51
  • [30] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,