Cloud Computing security classifications and taxonomies: a comprehensive study and comparison

被引:1
|
作者
Tissir, Najat [1 ]
El Kafhali, Said [2 ]
Aboutabit, Nourddine [1 ]
机构
[1] Sultan Moulay Slimane Univ, Proc Engn Comp Sci & Math Lab, Natl Sch Appl Sci, Khouribga, Morocco
[2] Hassan First Univ Settat, Comp Networks Mobil & Modeling Lab IR2M, Fac Sci & Tech, BP 577, Settat 26000, Morocco
关键词
Cloud Computing; Taxonomy; Classification; Threat; Attacks; ENERGY-CONSUMPTION; PERFORMANCE;
D O I
10.1109/CloudTech49835.2020.9365884
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud's attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.
引用
收藏
页码:264 / 269
页数:6
相关论文
共 50 条
  • [31] Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
    Ahmad, Waqas
    Rasool, Aamir
    Javed, Abdul Rehman
    Baker, Thar
    Jalil, Zunera
    ELECTRONICS, 2022, 11 (01)
  • [32] A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
    Mehmet Sabır Kiraz
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 731 - 760
  • [33] Security in cloud computing
    International Journal of Information Security, 2014, 13 : 95 - 96
  • [34] Security for Cloud Computing
    Nazeer, Shahrin A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [35] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [36] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [37] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [38] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [39] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [40] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287