Cloud computing security: A survey of service-based models

被引:40
|
作者
Parast, Fatemeh Khoda [1 ]
Sindhav, Chandni [1 ]
Nikam, Seema [1 ]
Yekta, Hadiseh Izadi [1 ]
Kent, Kenneth B. [1 ]
Hakak, Saqib [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Security; Cloud computing; Service-based cloud computing; IaaS; PaaS; SaaS; ISSUES; CHALLENGES; BENEFITS; IAAS;
D O I
10.1016/j.cose.2021.102580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have inevitably entangled with businesses' and individuals' daily lives through products and services. On-demand, pay-per-use characteristics encourage corporations to outsource part of their businesses to accelerate their services and multiply value. The latest market tendency toward migration to cloud environments, started in 2019, indicates a flourishing trend in the next few years. Despite the numerous benefits of the cloud computing model for businesses or individuals, security issues still have been stated as the top cloud challenge in 2020. Although various factors affect security, technologies enabling cloud computing such as virtualization and multitenancy, in addition to on-demand characteristics, initiate new security entrances for malevolent activities. In this study, we surveyed service-based cloud computing security issues to establish the current state of the field. The main contribution of this paper is to analyze the state of cloud security in the last decade and provide a unified taxonomy of security issues over the three-layer model, i.e., IaaS, PaaS, and SaaS. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] A survey on security issues in service delivery models of cloud computing
    Subashini, S.
    Kavitha, V.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 1 - 11
  • [2] Security Measurement in Service-based Computing Systems
    Mu, Chunyan
    Zeng, Wen
    [J]. 2012 FIFTH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2012,
  • [3] A new service-based computing security model with neural cryptography
    Hu, Dong
    [J]. PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 154 - 156
  • [4] A survey on automation of security requirements in service-based business processes
    Lins, Fernando A.A.
    Sousa, Erica T.G.
    Rosa, Nelson S.
    [J]. International Journal of Web Engineering and Technology, 2018, 13 (01) : 3 - 29
  • [5] Differentiated service-based evolutionary game scheduling algorithm for cloud computing
    [J]. Li, T.-S. (tshli@gxu.edu.cn), 1600, Beijing University of Posts and Telecommunications (36):
  • [6] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    [J]. PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [7] Automation of service-based security-aware business processes in the Cloud
    Lins, Fernando
    Damasceno, Julio
    Medeiros, Robson
    Sousa, Erica
    Rosa, Nelson
    [J]. COMPUTING, 2016, 98 (09) : 847 - 870
  • [8] Automation of service-based security-aware business processes in the Cloud
    Fernando Lins
    Julio Damasceno
    Robson Medeiros
    Erica Sousa
    Nelson Rosa
    [J]. Computing, 2016, 98 : 847 - 870
  • [9] A Survey on the Security of Cloud Computing
    Alhenaki, Lubna
    Alwatban, Alaa
    Alamri, Bashaer
    Alarifi, Noof
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [10] Cloud Computing Security: A Survey
    Khalil, Issa M.
    Khreishah, Abdallah
    Azeem, Muhammad
    [J]. COMPUTERS, 2014, 3 (01) : 1 - 35