A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing

被引:39
|
作者
Jangjou, Mehrdad [1 ]
Sohrabi, Mohammad Karim [1 ]
机构
[1] Islamic Azad Univ, Semnan Branch, Dept Comp Engn, Semnan, Iran
关键词
INTRUSION DETECTION; RISK-ASSESSMENT; ISSUES; IAAS; TAXONOMY; PAAS; PERFORMANCE; INFRASTRUCTURE; PREVENTION; ATTACKS;
D O I
10.1007/s11831-022-09708-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Conducting enterprise distributed computing and providing facilities such as data storage and resource sharing, along with the provision of cheap, easy, and flexible services, have led to the increasing popularity of cloud computing. Data migration and applications outside the administrative domain of customers cause numerous security challenges in cloud computing. Investigating the security challenges, vulnerabilities, and threats in different network layers is important due to the significant role of security in cloud computing. In this paper, the existing challenges of different network layers in cloud computing will be identified, analyzed, and classified. Categorizing security challenges in cloud computing from the network layers' perspective considering service models, cloud service providers and cloud users leads to useful methods for system designers to provide a systematic approach for a deeper understanding and then, detecting and preventing security risks. Emerging solutions and preventive methods that may potentially reduce vulnerabilities in various network layers are also introduced in this paper.
引用
收藏
页码:3587 / 3608
页数:22
相关论文
共 50 条
  • [31] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [32] Security Challenges in Vehicular Cloud Computing
    Yan, Gongjun
    Wen, Ding
    Olariu, Stephan
    Weigle, Michele C.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (01) : 284 - 294
  • [33] The Security Challenges in Healthcare Cloud Computing
    Alsuwaidani, Talal
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (03): : 731 - 737
  • [34] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [35] A Survey on Information Security in Cloud Computing
    Orantes Jimenez, Sandra Dinora
    Aguirre Anaya, Eleazar
    COMPUTACION Y SISTEMAS, 2020, 24 (02): : 819 - 833
  • [36] A Survey on the Security of Hypervisors in Cloud Computing
    Riddle, Andrew R.
    Chung, Soon M.
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2015, : 100 - 104
  • [37] Vehicular Cloud Computing Security: A Survey
    Hadjer Goumidi
    Zibouda Aliouat
    Saad Harous
    Arabian Journal for Science and Engineering, 2020, 45 : 2473 - 2499
  • [38] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [39] A survey of security issues for cloud computing
    Khan, Minhaj Ahmad
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 71 : 11 - 29
  • [40] Cloud Computing Security Issue: Survey
    Kamal, Shailza
    Kaur, Rajpreet
    2ND INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-11), 2011, 1414