首页> 外文期刊>Computers >Cloud Computing Security: A Survey
【24h】

Cloud Computing Security: A Survey

机译:云计算安全性:一项调查

获取原文
           

摘要

Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.
机译:云计算是一种新兴的技术范例,可将当前的技术和计算概念迁移到类似于电力和供水系统的类似于公用事业的解决方案中。云带来了广泛的好处,包括可配置的计算资源,经济节省和服务灵活性。但是,安全和隐私问题被证明是广泛采用云的主要障碍。云引入的新概念,例如多租户,资源共享和外包,给安全社区带来了新的挑战。应对这些挑战,除了能够培养和调整为传统计算系统开发的安全措施之外,还需要提出新的安全策略,模型和协议来应对独特的云安全挑战。在这项工作中,我们提供了对云计算安全性和隐私问题的全面研究。我们将识别云漏洞,对已知的安全威胁和攻击进行分类,并提供最新的实践来控制漏洞,消除威胁并校准攻击。此外,我们将调查并确定当前解决方案的局限性,并提供有关未来安全性观点的见解。最后,我们提供了一个云安全框架,其中我们提出了各种防御措施,并确定了其中的依赖性级别。我们确定了28种云安全威胁,将其分为五类。我们还提出了9种一般性的云攻击以及各种攻击事件,并对提出的对策进行了有效性分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号