2012
DOI: 10.1007/s11227-012-0831-5
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security issues and solutions at different layers of Cloud computing

Abstract: This is the accepted version of the paper.This version of the publication may differ from the final published version. Permanent AbstractCloud computing offers scalable on-demand services toconsumers with greater flexibility and lesser infrastructure investment. Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existent in these protocols as well as threats introduced by newer architectures raise many securityand privacy concerns. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
172
0
3

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 334 publications
(181 citation statements)
references
References 39 publications
0
172
0
3
Order By: Relevance
“…The administrators of cloud computing are principally concerned with security and compliance (Modi, Patel, Borisaniya, Patel, & Rajarajan, 2013;Puthal et al, 2015). This introduces a number of cloud-related risks and threats (Khan, 2012;Zissis & Lekkas, 2012), thus leading to a shift in the roles of the staff ISACA, 2011;Pearson et al, 2012) in response to such concerns.…”
Section: Roles and Responsibilities Allocation Factors Specific To Thmentioning
confidence: 99%
“…The administrators of cloud computing are principally concerned with security and compliance (Modi, Patel, Borisaniya, Patel, & Rajarajan, 2013;Puthal et al, 2015). This introduces a number of cloud-related risks and threats (Khan, 2012;Zissis & Lekkas, 2012), thus leading to a shift in the roles of the staff ISACA, 2011;Pearson et al, 2012) in response to such concerns.…”
Section: Roles and Responsibilities Allocation Factors Specific To Thmentioning
confidence: 99%
“…The inherent vulnerabilities of internal network in host and Local Area Network (LAN) pose threat to the VMs when they are live migrated. These security challenges are presented in (Modi et al 2012;Qina et al 2012;Ranjith et al 2012;. It is believed that the VM migration security is an important research area.…”
Section: List Of Figuresmentioning
confidence: 99%
“…The network inside host and the LAN, in which migration is done, is vulnerable to attack just like physical network. This puts the VM guest OS and the applications hosted on it at risk (Modi et al, 2012;. The VM faces vulnerabilities when it migrates from one host to another (Clark et.…”
Section: List Of Figuresmentioning
confidence: 99%
“…Ref. [10] reviewed the cloud computing security issues at different levels and provided solutions; however an overview of the cloud technology in addition to the future work were missing. Ref.…”
Section: …………………………………………………………………………………………………… Introduction:-mentioning
confidence: 99%