A survey on cloud computing security: Issues, threats, and solutions

被引:223
|
作者
Singh, Saurabh [1 ]
Jeong, Young-Sik [2 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
[2] Dongguk Univ, Dept Multimedia Engn, Seoul 04620, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud computing; Security; Embedded system; Resource pooling; PRIVACY; VIRTUALIZATION; ARCHITECTURE; CHALLENGES; PROTECTION; TRUST; ERA;
D O I
10.1016/j.jnca.2016.09.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand services to consumers with greater flexibility in a cost effective manner. While moving towards the concept of on demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability. This survey present a comprehensive overview of the security issues for different factors affecting cloud computing. Furthermore, a detailed discussion on several key topics regarding embedded system, application, storage system, clustering related issues and many more. This paper works on some public cloud and private cloud authorities as well as related security concerns. Additionally, it encompasses the requirements for better security management and suggests 3-tier security architecture. Open issues with discussion in which some new security concepts and recommendations are also provided. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:200 / 222
页数:23
相关论文
共 50 条
  • [41] On Cloud Computing Security Issues
    Fauzi, Ainul Azila Che
    Noraziah, A.
    Herawan, Tutut
    Zin, Noriyani Mohd.
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2012), PT II, 2012, 7197 : 560 - 569
  • [42] Security Issues In Cloud Computing
    Ochani, Arti
    Dongre, Nilima
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 783 - 787
  • [43] Security Issues in Cloud Computing
    Borazjani, Parnian Najafi
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 800 - 811
  • [44] Securities and threats of Cloud Computing and Solutions
    Gayatri, P.
    Venunath, M.
    Subhashini, V.
    Umar, Syed
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1162 - 1166
  • [45] A Review on Cloud Security Threats and Solutions
    Sebastian, Anu Maria
    Kizhakkethottam, Jubilent J.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,
  • [46] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [47] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [48] A Classification and Characterization of Security Threats in Cloud Computing
    Islam, Tariqul
    Manivannan, D.
    Zeadally, Sherali
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 1 - 17
  • [49] Virtualization: Issues, Security Threats, and Solutions
    Pearce, Michael
    Zeadally, Sherali
    Hunt, Ray
    ACM COMPUTING SURVEYS, 2013, 45 (02)
  • [50] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111