Abstract
We presented an overview of the state-of-the-art of cloud computing security which covers its essential challenges through the main different cyber-security threats, the main different approaches, algorithms and techniques developed to address them, as well as the open problems which define the research directions in this area. The bottom line is that the state of maturity of cloud computing security is very promising and there are many research directions still open and which promise continued improvements of cloud security and privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armbrust, M., et al.: Above the clouds: a Berkeley view of cloud computing. UC Berkeley Technical Report (2009)
Mell, P.: The NIST Definition of Cloud, Reports on Computer Systems Technology, p. 7, September 2011
Microsoft multi tenant data architecture. http://msdn.microsoft.com/en-us/library/aa479016.aspx
Sosinsky, B.: Cloud Computing Bible (2015)
Tianfield, H.: Security issues in cloud computing school of engineering and built environment. Glasgow Caledonian University, United Kingdom (2012)
Service Level Agreement and Master Service Agreement. http://www.softlayer.com/sla.html. Accessed 05 Apr 2009
Kandukuri, B.R., Ramakrishna Paturi, V., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing. Advanced Software Technologies International Institute of Information Technology (2009)
Karajeh, H., Maqableh, M., Masa’deh, R.: Security of Cloud Computing Environment (2014)
Security for cloud computation: Ten steps to ensure success, version 2, March 2015
Rabai, L.B.A., Jouini, M., Aissa, A.B., Mili, A.: A cyber security model in cloud computing environments. J. King Saud Univ. Comput. Inf. Sci. 25, 63–75 (2013)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Comput. Syst. 21, 513–592 (2012)
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258(10), 371–386 (2014)
Turban, E., King, D.: Electronic Commerce, Global edn. Person, Upper Saddle River (2012)
Sullivan, B., Tabet, S.: Practices for Secure Development of Cloud Applications (2013)
Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). Recommendations of the National Institute of Standards and Technology (2007)
Security Breach - Explore the Internet - urlfo.com, dreached while scanning argument. www.urlfo.com/phrase/security-breach
Data loss - Wikipedia, the free encyclopedia. en.wikipedia.org/wiki/Data_loss
Claburn, T.: Google Study Finds Widespread Account Hijacking, February 2014
InsecureAPImplementationT. http://www.darkreading.com/cloud/insecure-api-implementations-threaten-cloud/d/d-id/1137550?
Ali, M., Khan, S.U.: Security in cloud computing approaches and solutions (2015)
Balachandra, K.R., Ramakrishna, V.P., Rakshit, A.: Cloud security issues. In: Proceedings of the IEEE International Conference on Services Computing, SCC 2009, pp. 517–520 (2009)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169–178. Association for Computing Machinery, New York (2009)
Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Softw. 86, 2263–2268 (2013)
Mondol, J.-A.M., IEEE Member: Cloud security using Solutions using FPGA (2012)
Leu, F.Y., Lin, J.C., Li, M.C., Yang, C.T., Shih, P.C.: Integrating grid with intrusion detection. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 1, pp. 304–309 (2005)
Lin, D., Squicciarini, A.: Data protection models for service provisioning in the cloud. In: Proceeding of the ACM Symposium on Access Control Models and Technologies, SACMAT 2010 (2010)
Hojabri, M., Venkat Rao, K.: Innovation in cloud computing: implementation of Kerberos version5 in cloud computing in order to enhance the security issues
Ludwig, H., Keller, A., Dan, A., King, R., Franck, R.: Web Service Level Agreement (WSLA) language specification. IBM Corporation (2003)
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)
Patel, P., Ranabahu, A.H., Sheth, A.P.: Service Level Agreement in Cloud Computing (2008)
Bendahman, A., Essaaidi, M., El Moussoaui, A.: The effectiveness of reputation-based voting for collusion tolerance in large-scale grids. IEEE Trans. Dependable Secure Comput. 12(6), 665–674 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Bennasar, H., Bendahmane, A., Essaaidi, M. (2017). An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. In: El Hajji, S., Nitaj, A., Souidi, E. (eds) Codes, Cryptology and Information Security. C2SI 2017. Lecture Notes in Computer Science(), vol 10194. Springer, Cham. https://doi.org/10.1007/978-3-319-55589-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-55589-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55588-1
Online ISBN: 978-3-319-55589-8
eBook Packages: Computer ScienceComputer Science (R0)