A survey on security issues in service delivery models of cloud computing

被引:1226
作者
Subashini, S. [1 ]
Kavitha, V. [1 ]
机构
[1] Anna Univ Tirunelveli, Tirunelveli 627007, TN, India
关键词
Cloud computing; Data privacy; Data protection; Security; Virtualization;
D O I
10.1016/j.jnca.2010.07.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology's (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 43 条
[1]  
AMAZON, 2010, AM EL COMP CLOUD EC2
[2]  
[Anonymous], SECURITY GUIDANCE CR
[3]  
[Anonymous], 2008489 CRYPT EPRINT
[4]  
[Anonymous], SEC CLOUD
[5]  
[Anonymous], GUID ID ACC MAN V2 1
[6]  
AUGER R, 2009, SQL INJECTION
[7]  
BASTA A, 2007, DELMAR CENGAGE LEARN
[8]  
BERNARD G, 2009, DEFINING PRIVATE CLO
[9]  
Berre A. J., 2009, P 24 ACM SIGPLAN C C, P697
[10]  
Blaze M., 1999, ROLE TRUST MANAGEMEN, P185, DOI [10.1007/3-540-48749-2_8, DOI 10.1007/3-540-48749-2_8]