Security and Privacy in Cloud Computing

被引:304
作者
Xiao, Zhifeng [1 ]
Xiao, Yang [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2013年 / 15卷 / 02期
基金
美国国家科学基金会;
关键词
cloud computing; security; privacy; trust; confidentiality; integrity; accountability; availability; ACCOUNTABILITY; PERFORMANCE; ISSUES;
D O I
10.1109/SURV.2012.060912.00182
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a critical concern. Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability, accountability, and privacy-preservability). Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Future research directions are previously determined for each attribute.
引用
收藏
页码:843 / 859
页数:17
相关论文
共 129 条
[1]  
Ampah Nana K., 2011, International Journal of Security and Networks, V6, P174, DOI 10.1504/IJSN.2011.043674
[2]  
[Anonymous], COLLABORATIVE MONITO
[3]  
[Anonymous], INT J SECURITY NETWO
[4]  
[Anonymous], 2003, P C INT INT CONTR IN
[5]  
[Anonymous], 2011, EUROSEC
[6]  
[Anonymous], 2008, P 2 ACM WORKSH COMP
[7]  
[Anonymous], 2007 IEEE S SEC PRIV
[8]  
[Anonymous], IEEE INFOCOM 2010 SA
[9]  
[Anonymous], 2009, 3 ACM SIGOPS INT WOR
[10]  
[Anonymous], 13 WORKSH HOT TOP OP