Cloud Computing Security: A Survey

Other literature type, Article English OPEN
Issa M. Khalil; Abdallah Khreishah; Muhammad Azeem;
(2014)
  • Publisher: MDPI AG
  • Journal: Computers (issn: 2073-431X)
  • Related identifiers: doi: 10.3390/computers3010001
  • Subject: security vulnerabilities | cloud security | insider attackers | attacks | Electronic computers. Computer science | threats | cloud computing | QA75.5-76.95

Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, econ... View more
  • References (105)
    105 references, page 1 of 11

    1. Tripathi, A.; Mishra, A. Cloud computing security considerations. In Proceedings of the 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xi'an, China, 14-16 September 2011; pp. 1-5.

    2. Wang, J.-J.; Mu, S. Security issues and countermeasures in cloud computing. In Proceedings of the 2011 IEEE International Conference on Grey Systems and Intelligent Services (GSIS), Nanjing, China, 15-18 September 2011; pp. 843-846.

    3. Final Version of NIST Cloud Computing Definition Published. Available online: http://www.nist.gov/itl/csd/cloud-102511.cfm (accessed on 25 August 2013).

    4. Lv, H.; Hu, Y. Analysis and research about cloud computing security protect policy. In Proceedings of the 2011 International Conference on Intelligence Science and Information Engineering (ISIE), Wuhan, China, 20-21 August 2011; pp. 214-216.

    5. Mell, P and Grance, T. The NIST Definition of Cloud Computing, NIST, USA. available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, USA, 2009.

    6. Jain, P.; Rane, D.; Patidar, S. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment. In Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), Mumbai, India, 11- 14 December 2011; pp. 456-461.

    7. Gowrigolla, B.; Sivaji, S.; Masillamani, M.R. Design and auditing of cloud computing security. In Proceedings of the 2010 5th International Conference on Information and Automation for Sustainability (ICIAFs), Colombo, Sri Lanka, 17-19 December 2010; pp. 292-297.

    8. Houmansadr, A.; Zonouz, S.A.; Berthier, R. A cloud-based intrusion detection and response system for mobile phones. In Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, China, 27-30 June 2011; pp. 31-32.

    9. M. Taifi, J. Y. Shi, A. Khreishah, “SpotMPI: A Framework for Auction-based HPC Computing Using Amazon Spot Instances”, in Proc. of the International Symposium on Advances of Distributed Computing and Networking (ADCN), 2011.

    10. Sabahi, F. Virtualization-level security in cloud computing. In Proceedings of the 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), Xi'an, China, 27- 29 May 2011; pp. 250-254.

  • Metrics
    No metrics available
Share - Bookmark