Cloud Computing security classifications and taxonomies: a comprehensive study and comparison

被引:1
|
作者
Tissir, Najat [1 ]
El Kafhali, Said [2 ]
Aboutabit, Nourddine [1 ]
机构
[1] Sultan Moulay Slimane Univ, Proc Engn Comp Sci & Math Lab, Natl Sch Appl Sci, Khouribga, Morocco
[2] Hassan First Univ Settat, Comp Networks Mobil & Modeling Lab IR2M, Fac Sci & Tech, BP 577, Settat 26000, Morocco
关键词
Cloud Computing; Taxonomy; Classification; Threat; Attacks; ENERGY-CONSUMPTION; PERFORMANCE;
D O I
10.1109/CloudTech49835.2020.9365884
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud's attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.
引用
收藏
页码:264 / 269
页数:6
相关论文
共 50 条
  • [21] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [22] Study of Security Mechanisms Implemented in Cloud Computing
    Elhouni, Abobaker
    Elfgee, ElBahlul
    Isak, Mohamed A.
    Ben Ammer, Khaled
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [23] SLA in Cloud Computing Architectures: A Comprehensive Study
    Aljoumah, Eman
    Al-Mousawi, Fajer
    Ahmad, Imtiaz
    Al-Shammri, Maha
    Al-Jady, Zahraa
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (05): : 7 - 31
  • [24] A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing
    Jangjou, Mehrdad
    Sohrabi, Mohammad Karim
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (06) : 3587 - 3608
  • [25] Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review
    Ali, Tarek
    Al-Khalidi, Mohammed
    Al-Zaidi, Rabab
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [26] A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
    Can, Ozgu
    Thabit, Fursan
    Aljahdali, Asia Othman
    Al-Homdy, Sharaf
    Alkhzaimi, Hoda A.
    CYBERNETICS AND SYSTEMS, 2023,
  • [27] Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [28] A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing
    Mehrdad Jangjou
    Mohammad Karim Sohrabi
    Archives of Computational Methods in Engineering, 2022, 29 : 3587 - 3608
  • [29] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Kiraz, Mehmet Sabir
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 731 - 760
  • [30] A New Shared and Comprehensive Tool of Cloud Computing Security Risk Assessment
    Drissi, Saadia
    Benhadou, Siham
    Medromi, Hicham
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 155 - 167