Security in cloud computing: Opportunities and challenges

被引:409
作者
Ali, Mazhar [1 ,3 ]
Khan, Samee U. [1 ]
Vasilakos, Athanasios V. [2 ]
机构
[1] N Dakota State Univ, Fargo, ND 58102 USA
[2] Kuwait Univ, Kuwait, Kuwait
[3] COMSATS Inst Informat Technol, Abbottabad, Pakistan
基金
美国国家科学基金会;
关键词
Cloud computing; Multi-tenancy; Security; Virtualization; Web services; VIRTUALIZATION SECURITY; ACCESS-CONTROL; PRIVACY; STORAGE; ISSUES; ARCHITECTURE; ENCRYPTION; HYPERVISOR; MODELS; SCHEME;
D O I
10.1016/j.ins.2015.01.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing exhibits, remarkable potential to provide cost effective, easy to manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their applications and services to the cloud. Even the critical infrastructure, for example, power generation and distribution plants are being migrated to the cloud computing paradigm. However, the services provided by third-party cloud service providers entail additional security threats. The migration of user's assets (data, applications, etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Moreover, the survey presents the recent solutions presented in the literature to counter the security issues. Furthermore, a brief view of security vulnerabilities in the mobile cloud computing are also highlighted. In the end, the discussion on the open issues and future research directions is also presented. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:357 / 383
页数:27
相关论文
共 127 条
[51]  
Ibrahim A. S., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P113, DOI 10.1109/ICNSS.2011.6059967
[52]  
Jansen W.A., 2011, Proceedings of the 44th Hawaii International Conference on System Sciences, P1, DOI [DOI 10.1109/HICSS.2011.103, 10.1109/HICSS.2011.103]
[53]   ImageElves: Rapid and Reliable System Updates in the Cloud [J].
Jeswani, Deepak ;
Verma, Akshat ;
Jayachandran, Praveen ;
Bhattacharya, Kamal .
2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, :390-399
[54]   Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption [J].
Jung, Taeho ;
Li, Xiang-Yang ;
Wan, Zhiguo ;
Wan, Meng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :190-199
[55]   BSS: block-based sharing scheme for secure data storage services in mobile cloud environment [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Ali, Mazhar ;
Madani, Sajjad A. ;
Khan, Atta Ur Rehman ;
Shamshirband, Shahaboddin .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (02) :946-976
[56]   Incremental proxy re-encryption scheme for mobile cloud computing environment [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Madani, Sajjad A. ;
Ali, Mazhar ;
Khan, Atta Ur Rehman ;
Shamshirband, Shahaboddin .
JOURNAL OF SUPERCOMPUTING, 2014, 68 (02) :624-651
[57]   Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Madani, Sajjad A. ;
Khan, Atta ur Rehman ;
Ali, Mazhar .
JOURNAL OF SUPERCOMPUTING, 2013, 66 (03) :1687-1706
[58]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299
[59]   A Survey of Mobile Cloud Computing Application Models [J].
Khan, Atta Ur Rehman ;
Othman, Mazliza ;
Madani, Sajjad Ahmad ;
Khan, Samee Ullah .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :393-413
[60]  
Latif R., 2014, FUTURE INFORM TECHNO, P285, DOI DOI 10.1007/978-3-642-40861-8