Security concerns in cloud computing

Issa Khalil, Abdallah Khreishah, Salah Bouktif, Azeem Ahmad

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Abstract

The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.

Original languageEnglish
Title of host publicationProceedings of the 2013 10th International Conference on Information Technology: New Generations, ITNG 2013
Pages411-416
Number of pages6
DOIs
Publication statusPublished - 4 Nov 2013
Externally publishedYes
Event2013 10th International Conference on Information Technology: New Generations, ITNG 2013 - Las Vegas, NV, United States
Duration: 15 Apr 201317 Apr 2013

Other

Other2013 10th International Conference on Information Technology: New Generations, ITNG 2013
CountryUnited States
CityLas Vegas, NV
Period15/4/1317/4/13

    Fingerprint

Keywords

  • Classification Scheme
  • Cloud Computing Attacks
  • Cloud Computing Security
  • Security Threats

ASJC Scopus subject areas

  • Information Systems

Cite this

Khalil, I., Khreishah, A., Bouktif, S., & Ahmad, A. (2013). Security concerns in cloud computing. In Proceedings of the 2013 10th International Conference on Information Technology: New Generations, ITNG 2013 (pp. 411-416). [6614342] https://doi.org/10.1109/ITNG.2013.127