DocumentCode
24145
Title
Security and Privacy in Cloud Computing
Author
Zhifeng Xiao ; Yang Xiao
Author_Institution
Dept. of Comput. Sci., Univ. of Alabama, Tuscaloosa, AL, USA
Volume
15
Issue
2
fYear
2013
fDate
Second Quarter 2013
Firstpage
843
Lastpage
859
Abstract
Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a critical concern. Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability, accountability, and privacy-preservability). Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Future research directions are previously determined for each attribute.
Keywords
cloud computing; data privacy; accountability; availability; cloud computing; confidentiality; defense strategy; integrity; privacy issues; privacy-preservability; security issues; threat models; Biological system modeling; Cloud computing; Computational modeling; Network security; Outsourcing; Privacy; Trust management; accountability; availability; cloud computing; confidentiality; integrity; privacy; security; trust;
fLanguage
English
Journal_Title
Communications Surveys & Tutorials, IEEE
Publisher
ieee
ISSN
1553-877X
Type
jour
DOI
10.1109/SURV.2012.060912.00182
Filename
6238281
Link To Document