2014
DOI: 10.3390/computers3010001
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Security: A Survey

Abstract: Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 211 publications
(83 citation statements)
references
References 82 publications
0
82
0
1
Order By: Relevance
“…The fact that multiple virtual machines share the same hardware side channel attack makes it relatively easy to achieve. Without implementation of the safety device in the hardware, equipment sharing is dangerous [2].…”
Section: E Side Channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The fact that multiple virtual machines share the same hardware side channel attack makes it relatively easy to achieve. Without implementation of the safety device in the hardware, equipment sharing is dangerous [2].…”
Section: E Side Channel Attacksmentioning
confidence: 99%
“…We briefly explain each attack and accompanied by a brief discussion of the consequences of the attacks in the cloud environment. Table 2 presents a summary of attack names and attack category [2] [7] [9].…”
Section: Attacks Related To the Cloud Security Categoriesmentioning
confidence: 99%
“…The main difference is that the cache is used instead of the main memory to transfer data [18] [21]. This attack aims to measure the delay incurred when the CPU loads the selected data from the main memory to the cache.…”
Section: Side Channel Attacksmentioning
confidence: 99%
“…For instance, multi-tenancy promotes resource sharing among multiple users or tenants. These potentially untrusted tenants could perform side channel attacks and leak sensitive information pertaining to the cloud service provider (CSP) or the hypervisor hosting the targeted virtual machine [17] [18].…”
Section: Issues With Access Control In Cloudmentioning
confidence: 99%
“…However, there are some risks involved in cloud computing [4,5]. One of the major risk issues is cloud computing security followed by application readiness and cost.…”
Section: Introductionmentioning
confidence: 99%