C2SI 2017: Codes, Cryptology and Information Security pp 56-67 | Cite as
An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
Conference paper
First Online:
Abstract
We presented an overview of the state-of-the-art of cloud computing security which covers its essential challenges through the main different cyber-security threats, the main different approaches, algorithms and techniques developed to address them, as well as the open problems which define the research directions in this area. The bottom line is that the state of maturity of cloud computing security is very promising and there are many research directions still open and which promise continued improvements of cloud security and privacy.
References
- 1.Armbrust, M., et al.: Above the clouds: a Berkeley view of cloud computing. UC Berkeley Technical Report (2009)Google Scholar
- 2.Mell, P.: The NIST Definition of Cloud, Reports on Computer Systems Technology, p. 7, September 2011Google Scholar
- 3.Microsoft multi tenant data architecture. http://msdn.microsoft.com/en-us/library/aa479016.aspx
- 4.Sosinsky, B.: Cloud Computing Bible (2015)Google Scholar
- 5.Tianfield, H.: Security issues in cloud computing school of engineering and built environment. Glasgow Caledonian University, United Kingdom (2012)Google Scholar
- 6.Service Level Agreement and Master Service Agreement. http://www.softlayer.com/sla.html. Accessed 05 Apr 2009
- 7.Kandukuri, B.R., Ramakrishna Paturi, V., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing. Advanced Software Technologies International Institute of Information Technology (2009)Google Scholar
- 8.Karajeh, H., Maqableh, M., Masa’deh, R.: Security of Cloud Computing Environment (2014)Google Scholar
- 9.Security for cloud computation: Ten steps to ensure success, version 2, March 2015Google Scholar
- 10.Rabai, L.B.A., Jouini, M., Aissa, A.B., Mili, A.: A cyber security model in cloud computing environments. J. King Saud Univ. Comput. Inf. Sci. 25, 63–75 (2013)CrossRefGoogle Scholar
- 11.Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Comput. Syst. 21, 513–592 (2012)Google Scholar
- 12.Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258(10), 371–386 (2014)CrossRefGoogle Scholar
- 13.Turban, E., King, D.: Electronic Commerce, Global edn. Person, Upper Saddle River (2012)Google Scholar
- 14.Sullivan, B., Tabet, S.: Practices for Secure Development of Cloud Applications (2013)Google Scholar
- 15.Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). Recommendations of the National Institute of Standards and Technology (2007)Google Scholar
- 16.Security Breach - Explore the Internet - urlfo.com, dreached while scanning argument. www.urlfo.com/phrase/security-breach
- 17.Data loss - Wikipedia, the free encyclopedia. en.wikipedia.org/wiki/Data_loss
- 18.Claburn, T.: Google Study Finds Widespread Account Hijacking, February 2014Google Scholar
- 19.InsecureAPImplementationT. http://www.darkreading.com/cloud/insecure-api-implementations-threaten-cloud/d/d-id/1137550?
- 20.Ali, M., Khan, S.U.: Security in cloud computing approaches and solutions (2015)Google Scholar
- 21.Balachandra, K.R., Ramakrishna, V.P., Rakshit, A.: Cloud security issues. In: Proceedings of the IEEE International Conference on Services Computing, SCC 2009, pp. 517–520 (2009)Google Scholar
- 22.Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169–178. Association for Computing Machinery, New York (2009)Google Scholar
- 23.Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86, 2263–2268 (2013)CrossRefGoogle Scholar
- 24.
- 25.Mondol, J.-A.M., IEEE Member: Cloud security using Solutions using FPGA (2012)Google Scholar
- 26.Leu, F.Y., Lin, J.C., Li, M.C., Yang, C.T., Shih, P.C.: Integrating grid with intrusion detection. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 1, pp. 304–309 (2005)Google Scholar
- 27.Lin, D., Squicciarini, A.: Data protection models for service provisioning in the cloud. In: Proceeding of the ACM Symposium on Access Control Models and Technologies, SACMAT 2010 (2010)Google Scholar
- 28.
- 29.Hojabri, M., Venkat Rao, K.: Innovation in cloud computing: implementation of Kerberos version5 in cloud computing in order to enhance the security issuesGoogle Scholar
- 30.Ludwig, H., Keller, A., Dan, A., King, R., Franck, R.: Web Service Level Agreement (WSLA) language specification. IBM Corporation (2003)Google Scholar
- 31.Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)CrossRefGoogle Scholar
- 32.Patel, P., Ranabahu, A.H., Sheth, A.P.: Service Level Agreement in Cloud Computing (2008)Google Scholar
- 33.Bendahman, A., Essaaidi, M., El Moussoaui, A.: The effectiveness of reputation-based voting for collusion tolerance in large-scale grids. IEEE Trans. Dependable Secure Comput. 12(6), 665–674 (2015)CrossRefGoogle Scholar
Copyright information
© Springer International Publishing AG 2017