Cloud Computing security classifications and taxonomies: a comprehensive study and comparison

被引:1
|
作者
Tissir, Najat [1 ]
El Kafhali, Said [2 ]
Aboutabit, Nourddine [1 ]
机构
[1] Sultan Moulay Slimane Univ, Proc Engn Comp Sci & Math Lab, Natl Sch Appl Sci, Khouribga, Morocco
[2] Hassan First Univ Settat, Comp Networks Mobil & Modeling Lab IR2M, Fac Sci & Tech, BP 577, Settat 26000, Morocco
关键词
Cloud Computing; Taxonomy; Classification; Threat; Attacks; ENERGY-CONSUMPTION; PERFORMANCE;
D O I
10.1109/CloudTech49835.2020.9365884
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud's attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.
引用
收藏
页码:264 / 269
页数:6
相关论文
共 50 条
  • [41] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [42] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [43] COMPARISON OF DATA SECURITY SCHEMES FRAMEWORK FOR MOBILE CLOUD COMPUTING
    Chauhan, Sumant Raj
    Kumar, Pankaj
    Bali, Vikram
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2019, 18 (08): : 767 - 774
  • [44] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
  • [45] A Study on the Security of Patch Management in a Cloud Computing Environment
    Hu, Yong-Xiang
    2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 278 - 282
  • [46] A Study on Data Storage Security Issues in Cloud Computing
    Vurukonda, Naresh
    Rao, B. Thirumala
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 128 - 135
  • [47] Security of Mobile Cloud Computing: A Systematic Mapping Study
    Jara Juarez, Diego X.
    Cedillo, Priscila
    2017 IEEE SECOND ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2017,
  • [48] Security, Privacy and Trust in Cloud Computing: A Comparative Study
    Alouane, Meryeme
    El Bakkali, Hanan
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 23 - 30
  • [49] A Study on the Virtualization Security Management in the Cloud Computing Environment
    Cheong, Il-Ahn
    Lee, Seulgi
    Son, Kyungho
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2035 - 2039
  • [50] Comparative study of cryptography for cloud computing for data security
    Mathur P.
    Gupta A.K.
    Vashishtha P.
    Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1508 - 1513