EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 1

Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey

journal image
 Download
1867
  • Seyyed Mohsen Hashemi and Mohammad Reza Mollahoseini Ardakani 2012. Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey. International Journal of Applied Information Systems. 4, 1 (September 2012), 21-28. DOI=http://dx.doi.org/10.5120/ijais450611
  • @article{10.5120/ijais2017451568,
    author = {Seyyed Mohsen Hashemi and Mohammad Reza Mollahoseini Ardakani},
    title = {Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey},
    journal = {International Journal of Applied Information Systems},
    issue_date = {September 2012},
    volume = {4},
    number = {},
    month = {September},
    year = {2012},
    issn = {},
    pages = {21-28},
    numpages = {},
    url = {/archives/volume4/number1/264-0611},
    doi = { 10.5120/ijais12-450611},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450611
    %A Seyyed Mohsen Hashemi
    %A Mohammad Reza Mollahoseini Ardakani
    %T Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey
    %J International Journal of Applied Information Systems
    %@ 
    %V 4
    %N 
    %P 21-28
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

Cloud Computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everythingsdelivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is one of the major issues which hamper the growth of cloud. In this paper, to facilitate identifying the security threats of cloud computing, we Taxonomy the security aspects of cloud computing systems and summarize the main security threats of it. Our taxonomy covers the four domains of cloud computing systems: infrastructure layer, platform layer, application layer and administration.

References

  1. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, Vol. 34, pp. 1-11, 2011.
  2. P. Mell, T. Grance, (2011). "The NIST definition of cloud computing". National Institute of Standards and Technology, U. S. Department of Commerce. (Special Publication 800-145). Retrieved from http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf
  3. J. Bishop, (2011). "Cloud definition model". Personal blog. Retrieved from http://blog. thehigheredcio. com/2011/02/23/cloud-definition-model/
  4. DimitriosZissis, DimitriosLekkas, "Addressing cloud computing security issues", Future Generation Computer Systems,Vol. 28, pp. 583-592, 2012.
  5. Cloud Security Alliance, March 2010, "Top Threats to Cloud Computing", Retrieved from https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf
  6. JianhuaChe, YaminDuan, Tao Zhang, Jie Fan, "Study on the security models and strategies of cloud computing", Procedia Engineering, Vol. 23, pp. 586-593, 2011.
  7. Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, "Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments", Procedia Engineering, Vol. 15, pp. 2852-2856, 2011.
  8. Yanpei Chen, Vern Paxson, Randy H. Katz,"What's New about Cloud Computing Security?", 2010,Retrieved fromhttp://www. eecs. berkeley. edu/Pubs/TechRpts/2010/EECS-2010-5. html
  9. Trend Micro, "Security Threats TO EvolvingData Centers", Retrieved from http://www. trendmicro. com/cloud-content/us/pdfs/about/rpt_security-threats-to-datacenters. pdf
  10. DR. Werner Streitberger, Angelika Ruppel, "Cloud Computing Security", 2010, Retrieved from http://www. aisec. fraunhofer. de/content/dam/aisec/en/pdf/studien/studieCloudComputingSicherheit-AISEC-en. pdf
  11. Wikipedia, "Side channel attack"http://en. wikipedia. org/wiki/Side_channel_attack.
  12. Doug Hyde, "A Survey on the Security of Virtual Machines", 2009, Retrieved from http://www. cs. wustl. edu/~jain/cse571-09/ftp/vmsec/
  13. Kumar Dayanand, S. Magesh, "Defense Strategy against Flooding Attacks Using Nash Equilibrium Game Theory", International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
  14. UNIKEN Inc. "Security Manual", 2009, Retrieved fromwww. uniken. com/Whitepapers/Security_Manual. pdf

Keywords

Cloud computing security, Threats, Taxonomy

Index Terms

Computer Science
Information Sciences