Cloud computing security: A survey

Issa Khalil, Abdallah Khreishah, Muhammad Azeem

Research output: Contribution to journalArticle

87 Citations (Scopus)

Abstract

Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

Original languageEnglish
Pages (from-to)1-35
Number of pages35
JournalComputers
Volume3
Issue number1
DOIs
Publication statusPublished - 1 Mar 2014

Fingerprint

Cloud computing
Outsourcing
Electricity
Economics
Water

Keywords

  • Attacks
  • Cloud computing
  • Cloud security
  • Insider attackers
  • Security vulnerabilities
  • Threats

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications

Cite this

Cloud computing security : A survey. / Khalil, Issa; Khreishah, Abdallah; Azeem, Muhammad.

In: Computers, Vol. 3, No. 1, 01.03.2014, p. 1-35.

Research output: Contribution to journalArticle

Khalil, I, Khreishah, A & Azeem, M 2014, 'Cloud computing security: A survey', Computers, vol. 3, no. 1, pp. 1-35. https://doi.org/10.3390/computers3010001
Khalil, Issa ; Khreishah, Abdallah ; Azeem, Muhammad. / Cloud computing security : A survey. In: Computers. 2014 ; Vol. 3, No. 1. pp. 1-35.
@article{4931cc31922842ea9cea99287d4f032d,
title = "Cloud computing security: A survey",
abstract = "Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.",
keywords = "Attacks, Cloud computing, Cloud security, Insider attackers, Security vulnerabilities, Threats",
author = "Issa Khalil and Abdallah Khreishah and Muhammad Azeem",
year = "2014",
month = "3",
day = "1",
doi = "10.3390/computers3010001",
language = "English",
volume = "3",
pages = "1--35",
journal = "Computers",
issn = "2073-431X",
publisher = "MDPI AG",
number = "1",

}

TY - JOUR

T1 - Cloud computing security

T2 - A survey

AU - Khalil, Issa

AU - Khreishah, Abdallah

AU - Azeem, Muhammad

PY - 2014/3/1

Y1 - 2014/3/1

N2 - Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

AB - Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

KW - Attacks

KW - Cloud computing

KW - Cloud security

KW - Insider attackers

KW - Security vulnerabilities

KW - Threats

UR - http://www.scopus.com/inward/record.url?scp=85063830027&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85063830027&partnerID=8YFLogxK

U2 - 10.3390/computers3010001

DO - 10.3390/computers3010001

M3 - Article

AN - SCOPUS:85063830027

VL - 3

SP - 1

EP - 35

JO - Computers

JF - Computers

SN - 2073-431X

IS - 1

ER -