Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

February Edition 2019

International Journal of Applied Information Systems solicits high quality original research papers for the January 2019 Edition of the journal. The last date of research paper submission is January 15, 2019.

Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey

Seyyed Mohsen Hashemi, Mohammad Reza Mollahoseini Ardakani Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
10.5120/ijais12-450611
Download full text
  1. Seyyed Mohsen Hashemi and Mohammad Reza Mollahoseini Ardakani. Article: Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey. International Journal of Applied Information Systems 4(1):21-28, September 2012. BibTeX

    @article{key:article,
    	author = "Seyyed Mohsen Hashemi and Mohammad Reza Mollahoseini Ardakani",
    	title = "Article: Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 1,
    	pages = "21-28",
    	month = "September",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Cloud Computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everythingsdelivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is one of the major issues which hamper the growth of cloud. In this paper, to facilitate identifying the security threats of cloud computing, we Taxonomy the security aspects of cloud computing systems and summarize the main security threats of it. Our taxonomy covers the four domains of cloud computing systems: infrastructure layer, platform layer, application layer and administration.

Reference

  1. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, Vol. 34, pp. 1-11, 2011.
  2. P. Mell, T. Grance, (2011). "The NIST definition of cloud computing". National Institute of Standards and Technology, U. S. Department of Commerce. (Special Publication 800-145). Retrieved from http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf
  3. J. Bishop, (2011). "Cloud definition model". Personal blog. Retrieved from http://blog. thehigheredcio. com/2011/02/23/cloud-definition-model/
  4. DimitriosZissis, DimitriosLekkas, "Addressing cloud computing security issues", Future Generation Computer Systems,Vol. 28, pp. 583-592, 2012.
  5. Cloud Security Alliance, March 2010, "Top Threats to Cloud Computing", Retrieved from https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf
  6. JianhuaChe, YaminDuan, Tao Zhang, Jie Fan, "Study on the security models and strategies of cloud computing", Procedia Engineering, Vol. 23, pp. 586-593, 2011.
  7. Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, "Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments", Procedia Engineering, Vol. 15, pp. 2852-2856, 2011.
  8. Yanpei Chen, Vern Paxson, Randy H. Katz,"What's New about Cloud Computing Security?", 2010,Retrieved fromhttp://www. eecs. berkeley. edu/Pubs/TechRpts/2010/EECS-2010-5. html
  9. Trend Micro, "Security Threats TO EvolvingData Centers", Retrieved from http://www. trendmicro. com/cloud-content/us/pdfs/about/rpt_security-threats-to-datacenters. pdf
  10. DR. Werner Streitberger, Angelika Ruppel, "Cloud Computing Security", 2010, Retrieved from http://www. aisec. fraunhofer. de/content/dam/aisec/en/pdf/studien/studieCloudComputingSicherheit-AISEC-en. pdf
  11. Wikipedia, "Side channel attack"http://en. wikipedia. org/wiki/Side_channel_attack.
  12. Doug Hyde, "A Survey on the Security of Virtual Machines", 2009, Retrieved from http://www. cs. wustl. edu/~jain/cse571-09/ftp/vmsec/
  13. Kumar Dayanand, S. Magesh, "Defense Strategy against Flooding Attacks Using Nash Equilibrium Game Theory", International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
  14. UNIKEN Inc. "Security Manual", 2009, Retrieved fromwww. uniken. com/Whitepapers/Security_Manual. pdf

Keywords

Cloud computing security, Threats, Taxonomy