• DocumentCode
    24145
  • Title

    Security and Privacy in Cloud Computing

  • Author

    Zhifeng Xiao ; Yang Xiao

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Alabama, Tuscaloosa, AL, USA
  • Volume
    15
  • Issue
    2
  • fYear
    2013
  • fDate
    Second Quarter 2013
  • Firstpage
    843
  • Lastpage
    859
  • Abstract
    Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a critical concern. Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability, accountability, and privacy-preservability). Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Future research directions are previously determined for each attribute.
  • Keywords
    cloud computing; data privacy; accountability; availability; cloud computing; confidentiality; defense strategy; integrity; privacy issues; privacy-preservability; security issues; threat models; Biological system modeling; Cloud computing; Computational modeling; Network security; Outsourcing; Privacy; Trust management; accountability; availability; cloud computing; confidentiality; integrity; privacy; security; trust;
  • fLanguage
    English
  • Journal_Title
    Communications Surveys & Tutorials, IEEE
  • Publisher
    ieee
  • ISSN
    1553-877X
  • Type

    jour

  • DOI
    10.1109/SURV.2012.060912.00182
  • Filename
    6238281