2016
DOI: 10.1080/08874417.2016.1192520
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy for Identification of Security Issues in Cloud Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 48 publications
0
21
0
Order By: Relevance
“…Service level agreement (SLA): it is necessary for customers to have guarantees from suppliers on service offer. Typically, these are offered via Service Level Agreements (SLAs) discussed between the providers and customers [79]. The very first problem is to determine SLA particularizations just like that has a convenient level of granularity expected by a customer from a provider [10,16,23].…”
Section: Technical Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Service level agreement (SLA): it is necessary for customers to have guarantees from suppliers on service offer. Typically, these are offered via Service Level Agreements (SLAs) discussed between the providers and customers [79]. The very first problem is to determine SLA particularizations just like that has a convenient level of granularity expected by a customer from a provider [10,16,23].…”
Section: Technical Issuesmentioning
confidence: 99%
“…Integrity The integrity of applications, networks, databases and system software in a shared, globally available cloud environment is threatened by much vulnerability when not adequate and timely patched [4,9,16,28,54,67].…”
Section: Technical Issuesmentioning
confidence: 99%
“…Primary threat vectors to Cloud Computing appear as technological factors (hardware and software) and human factors [2]. These can be further broken down into the following categories:…”
Section: Introductionmentioning
confidence: 99%
“…Scrutinizing the literature, it is possible to observe that apart from the Hadoop security infrastructure based on Kerberos, there is a wide demand for developing security models and policies in for the cloud domain [16], [21], [22], [7]. Such models allow to analyze the consistency of a proposed security architecture, and figure out the basic adversary model [21].…”
Section: Related Workmentioning
confidence: 99%
“…The importance of security increases rapidly with the growth of Big Data industry. The efficient Big Data security infrastructure should include the following components: Authentication services; Access control infrastructure for the supported access policies; Encryption protocols and other standard cryptography services; Fast on-the-fly auditing services [7].…”
Section: Introductionmentioning
confidence: 99%