Cloud computing: Security challenges

A. Bouayad, A. Blilat, N. H. Mejhed, M. E. Ghazi
{"title":"Cloud computing: Security challenges","authors":"A. Bouayad, A. Blilat, N. H. Mejhed, M. E. Ghazi","doi":"10.1109/CIST.2012.6388058","DOIUrl":null,"url":null,"abstract":"Although cloud computing can help companies accomplish more by breaking the physical bonds between an IT infrastructure and its users, heightened security threats must be overcome in order to benefit fully from this new computing paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption. The security problem becomes more complicated under the cloud model as new dimensions have entered into the problem scope related to the model architecture, multi-tenancy, elasticity, and layers dependency stack. In this paper we introduce a detailed analysis of the cloud security problem. We investigated the problem from the cloud architecture perspective, the cloud offered characteristics perspective, the cloud stakeholders' perspective, and the cloud service delivery models perspective. Based on this analysis we derive a detailed specification of the cloud security problem and key features that should be covered by any proposed security solution.","PeriodicalId":120664,"journal":{"name":"2012 Colloquium in Information Science and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"83","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Colloquium in Information Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIST.2012.6388058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 83

Abstract

Although cloud computing can help companies accomplish more by breaking the physical bonds between an IT infrastructure and its users, heightened security threats must be overcome in order to benefit fully from this new computing paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption. The security problem becomes more complicated under the cloud model as new dimensions have entered into the problem scope related to the model architecture, multi-tenancy, elasticity, and layers dependency stack. In this paper we introduce a detailed analysis of the cloud security problem. We investigated the problem from the cloud architecture perspective, the cloud offered characteristics perspective, the cloud stakeholders' perspective, and the cloud service delivery models perspective. Based on this analysis we derive a detailed specification of the cloud security problem and key features that should be covered by any proposed security solution.
云计算:安全挑战
尽管云计算可以通过打破IT基础设施与其用户之间的物理联系来帮助公司完成更多的工作,但必须克服日益严重的安全威胁,以便从这种新的计算范式中充分受益,这种新的计算范式为组织提供了一种创新的业务模型,使其无需预先投资即可采用IT。尽管从云计算中获得了潜在的收益,但模型安全性仍然存在问题,这影响了云模型的采用。在云模型下,随着与模型体系结构、多租户、弹性和层依赖栈相关的新维度进入问题范围,安全性问题变得更加复杂。本文对云安全问题进行了详细的介绍和分析。我们从云架构的角度、云提供特征的角度、云利益相关者的角度和云服务交付模型的角度来研究这个问题。基于这一分析,我们得出了云安全问题的详细规范,以及任何提议的安全解决方案都应涵盖的关键特性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信