On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

被引:113
|
作者
Kumar, Rakesh [1 ]
Goyal, Rinkaj [1 ]
机构
[1] Guru Gobind Singh GGS Indraprastha Univ, Univ Sch Informat Commun & Technol, New Delhi 110078, India
关键词
Cloud computing; Security in cloud; Cloud security trust model; Cloud security challenges; Cloud security requirements threats vulnerabilities countermeasures; INTRUSION DETECTION; BIG DATA; INTEGRITY VERIFICATION; ACCESS-CONTROL; PREVENTION SYSTEM; DDOS ATTACKS; DATA-STORAGE; TRUST MODEL; SHARED DATA; CHALLENGES;
D O I
10.1016/j.cosrev.2019.05.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The world is witnessing a phenomenal growth in the cloud enabled services and is expected to grow further with the improved technological innovations. However, the associated security and privacy challenges inhibit its widespread adoption, and therefore require further exploration. Researchers from academia, industry, and standards organizations have provided potential solutions to these challenges in the previously published studies. The narrative review presented in this survey, however, provides an integrationist end-to-end mapping of cloud security requirements, identified threats, known vulnerabilities, and recommended countermeasures, which seems to be not presented before at one place. Additionally, this study contributes towards identifying a unified taxonomy for security requirements, threats, vulnerabilities and countermeasures to carry out the proposed end-to-end mapping. Further, it highlights security challenges in other related areas like trust based security models, cloud-enabled applications of Big Data, Internet of Things (IoT), Software Defined Network (SDN) and Network Function Virtualization (NFV). (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 48
页数:48
相关论文
共 50 条
  • [1] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
    Barrowclough, John Patrick
    Asif, Rameez
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [2] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    [J]. INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [3] Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
    Dahbur, Kamal
    Mohammad, Bassil
    Tarakji, Ahmad Bisher
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (03) : 1 - 11
  • [4] A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges
    Tahirkheli, Abeer Iftikhar
    Shiraz, Muhammad
    Hayat, Bashir
    Idrees, Muhammad
    Sajid, Ahthasham
    Ullah, Rahat
    Ayub, Nasir
    Kim, Ki-Il
    [J]. ELECTRONICS, 2021, 10 (15)
  • [5] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    [J]. PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [6] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [7] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831
  • [8] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [9] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art
    Pericherla, Suryateja S.
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 1 - 58
  • [10] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185