2016
DOI: 10.17706/jcp.11.3.201-206
|View full text |Cite
|
Sign up to set email alerts
|

Complying with Security Requirements in Cloud Storage Systems

Abstract: Abstract:One of the necessary steps to ensure the security of cloud storage systems is to adequately protect the infrastructure itself -the hardware and software that implements the storage services. Starting from an analysis of the security requirements that affect these storage systems, this paper studies the different strategies and approaches that are currently used to fulfill such requirements. The goal of this paper is twofold. Firstly, we aim to analyze the security components that should be used to pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Bessani et al [] discuss a similar use of multiple clouds, rather than a single cloud, to manage the risk of an insider attack. Roman et al [] conduct a comparative security analysis of several cloud systems, including OpenStack; the focus of this study is only on storage systems, such as Amazon's S3 service, rather than on the more general case of combined processing and storage services. Kim et al [] discuss some OpenStack security issues; their focus is mostly on denial of service attacks, rather than on attacks on confidentiality or integrity, but they do provide some insight into a SQL injection attack.…”
Section: Introductionmentioning
confidence: 99%
“…Bessani et al [] discuss a similar use of multiple clouds, rather than a single cloud, to manage the risk of an insider attack. Roman et al [] conduct a comparative security analysis of several cloud systems, including OpenStack; the focus of this study is only on storage systems, such as Amazon's S3 service, rather than on the more general case of combined processing and storage services. Kim et al [] discuss some OpenStack security issues; their focus is mostly on denial of service attacks, rather than on attacks on confidentiality or integrity, but they do provide some insight into a SQL injection attack.…”
Section: Introductionmentioning
confidence: 99%