Security in cloud computing: Opportunities and challenges

被引:406
|
作者
Ali, Mazhar [1 ,3 ]
Khan, Samee U. [1 ]
Vasilakos, Athanasios V. [2 ]
机构
[1] N Dakota State Univ, Fargo, ND 58102 USA
[2] Kuwait Univ, Kuwait, Kuwait
[3] COMSATS Inst Informat Technol, Abbottabad, Pakistan
基金
美国国家科学基金会;
关键词
Cloud computing; Multi-tenancy; Security; Virtualization; Web services; VIRTUALIZATION SECURITY; ACCESS-CONTROL; PRIVACY; STORAGE; ISSUES; ARCHITECTURE; ENCRYPTION; HYPERVISOR; MODELS; SCHEME;
D O I
10.1016/j.ins.2015.01.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user's assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues. Furthermore, a brief view of security vulnerabilities in the mobile cloud computing are also highlighted. In the end, the discussion on the open issues and future research directions is also presented. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:357 / 383
页数:27
相关论文
共 50 条
  • [1] Cloud computing: Opportunities and challenges
    Sadiku, Matthew N.O.
    Musa, Sarhan M.
    Momoh, Omonowo D.
    IEEE Potentials, 2014, 33 (01): : 34 - 36
  • [2] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [3] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [4] Cloud Computing and Security Challenges
    Yu, Huiming
    Powell, Nakia
    Stembridge, Dexter
    Yuan, Xiaohong
    PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [5] Cloud Computing Security: Opportunities and Pitfalls
    Arshad, Junaid
    Townend, Paul
    Xu, Jie
    Jie, Wei
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2012, 4 (01) : 52 - 66
  • [6] Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities
    Liu, Weiqiang
    Gu, Chongyan
    O'Neill, Maire
    Qu, Gang
    Montuschi, Paolo
    Lombardi, Fabrizio
    PROCEEDINGS OF THE IEEE, 2020, 108 (12) : 2214 - 2231
  • [7] Security in Cloud Computing: State-of-the-Art, Key Features, Challenges, and Opportunities
    Tubaishat, Abdallah
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 311 - 315
  • [8] Research Opportunities and Challenges of Security Concerns associated with Big Data in Cloud Computing
    Anandaraj, S. P.
    Kemal, Mohammed
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 746 - 751
  • [9] The Financialization of Cloud Computing: Opportunities and Challenges
    Irwin, David
    Sharma, Prateek
    Shastri, Supreeth
    Shenoy, Prashant
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [10] CLOUD COMPUTING ECONOMICS OPPORTUNITIES AND CHALLENGES
    Rafique, Khalid
    Tareen, Abdul Wahid
    Saeed, Muhammad
    Wu, Jingzhu
    Qureshi, Shahryar Shafique
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 401 - 406