CFP last date
17 June 2024
Reseach Article

Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey

by Seyyed Mohsen Hashemi, Mohammad Reza Mollahoseini Ardakani
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 1
Year of Publication: 2012
Authors: Seyyed Mohsen Hashemi, Mohammad Reza Mollahoseini Ardakani
10.5120/ijais12-450611

Seyyed Mohsen Hashemi, Mohammad Reza Mollahoseini Ardakani . Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey. International Journal of Applied Information Systems. 4, 1 ( September 2012), 21-28. DOI=10.5120/ijais12-450611

@article{ 10.5120/ijais12-450611,
author = { Seyyed Mohsen Hashemi, Mohammad Reza Mollahoseini Ardakani },
title = { Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey },
journal = { International Journal of Applied Information Systems },
issue_date = { September 2012 },
volume = { 4 },
number = { 1 },
month = { September },
year = { 2012 },
issn = { 2249-0868 },
pages = { 21-28 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number1/264-0611/ },
doi = { 10.5120/ijais12-450611 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:46:47.995904+05:30
%A Seyyed Mohsen Hashemi
%A Mohammad Reza Mollahoseini Ardakani
%T Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 1
%P 21-28
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a model of both service delivery and consumption for increasing the capabilities of enterprises dynamically without investing in new infrastructure, training new personnel, or licensing new software. It refers to everythingsdelivered as services over the Internet. Although the benefits of Cloud Computing are evident, security is one of the major issues which hamper the growth of cloud. In this paper, to facilitate identifying the security threats of cloud computing, we Taxonomy the security aspects of cloud computing systems and summarize the main security threats of it. Our taxonomy covers the four domains of cloud computing systems: infrastructure layer, platform layer, application layer and administration.

References
  1. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, Vol. 34, pp. 1-11, 2011.
  2. P. Mell, T. Grance, (2011). "The NIST definition of cloud computing". National Institute of Standards and Technology, U. S. Department of Commerce. (Special Publication 800-145). Retrieved from http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf
  3. J. Bishop, (2011). "Cloud definition model". Personal blog. Retrieved from http://blog. thehigheredcio. com/2011/02/23/cloud-definition-model/
  4. DimitriosZissis, DimitriosLekkas, "Addressing cloud computing security issues", Future Generation Computer Systems,Vol. 28, pp. 583-592, 2012.
  5. Cloud Security Alliance, March 2010, "Top Threats to Cloud Computing", Retrieved from https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf
  6. JianhuaChe, YaminDuan, Tao Zhang, Jie Fan, "Study on the security models and strategies of cloud computing", Procedia Engineering, Vol. 23, pp. 586-593, 2011.
  7. Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, "Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments", Procedia Engineering, Vol. 15, pp. 2852-2856, 2011.
  8. Yanpei Chen, Vern Paxson, Randy H. Katz,"What's New about Cloud Computing Security?", 2010,Retrieved fromhttp://www. eecs. berkeley. edu/Pubs/TechRpts/2010/EECS-2010-5. html
  9. Trend Micro, "Security Threats TO EvolvingData Centers", Retrieved from http://www. trendmicro. com/cloud-content/us/pdfs/about/rpt_security-threats-to-datacenters. pdf
  10. DR. Werner Streitberger, Angelika Ruppel, "Cloud Computing Security", 2010, Retrieved from http://www. aisec. fraunhofer. de/content/dam/aisec/en/pdf/studien/studieCloudComputingSicherheit-AISEC-en. pdf
  11. Wikipedia, "Side channel attack"http://en. wikipedia. org/wiki/Side_channel_attack.
  12. Doug Hyde, "A Survey on the Security of Virtual Machines", 2009, Retrieved from http://www. cs. wustl. edu/~jain/cse571-09/ftp/vmsec/
  13. Kumar Dayanand, S. Magesh, "Defense Strategy against Flooding Attacks Using Nash Equilibrium Game Theory", International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
  14. UNIKEN Inc. "Security Manual", 2009, Retrieved fromwww. uniken. com/Whitepapers/Security_Manual. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing security Threats Taxonomy