A survey on cloud computing security: Issues, threats, and solutions

被引:223
|
作者
Singh, Saurabh [1 ]
Jeong, Young-Sik [2 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
[2] Dongguk Univ, Dept Multimedia Engn, Seoul 04620, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud computing; Security; Embedded system; Resource pooling; PRIVACY; VIRTUALIZATION; ARCHITECTURE; CHALLENGES; PROTECTION; TRUST; ERA;
D O I
10.1016/j.jnca.2016.09.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand services to consumers with greater flexibility in a cost effective manner. While moving towards the concept of on demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability. This survey present a comprehensive overview of the security issues for different factors affecting cloud computing. Furthermore, a detailed discussion on several key topics regarding embedded system, application, storage system, clustering related issues and many more. This paper works on some public cloud and private cloud authorities as well as related security concerns. Additionally, it encompasses the requirements for better security management and suggests 3-tier security architecture. Open issues with discussion in which some new security concepts and recommendations are also provided. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:200 / 222
页数:23
相关论文
共 50 条
  • [21] Security Issues in Cloud Computing and their Solutions: A Review
    Sabir, Sabiyyah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 343 - 346
  • [22] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [23] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [24] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [25] Security threats and legal issues related to Cloud based solutions
    Alsolami, Eesa
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (05): : 156 - 163
  • [26] Addressing Mobile Cloud Computing Security Issues: A Survey
    Kulkarni, Pallavi
    Khanai, Rajashri
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1463 - 1467
  • [27] A Survey on Security Issues of Federated Identity in the Cloud Computing
    Ghazizadeh, Eghbal
    Ab Manan, Jamalul-lail
    Zamani, Mazdak
    Pashang, Abolghasem
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [28] Exploring Data Security Issues and Solutions in Cloud Computing
    Kumar, P. Ravi
    Raj, P. Herbert
    Jelciana, P.
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 691 - 697
  • [29] Security threats of virtualization in cloud computing
    Wang, H. (permutation@163.com), 1600, Huazhong University of Science and Technology (40):
  • [30] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,