Journal
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Volume 15, Issue 2, Pages 843-859Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/SURV.2012.060912.00182
Keywords
cloud computing; security; privacy; trust; confidentiality; integrity; accountability; availability
Funding
- U.S. National Science Foundation (NSF) [CNS-0716211, CCF-0829827, CNS-0737325, CNS-1059265]
Ask authors/readers for more resources
Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a critical concern. Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability, accountability, and privacy-preservability). Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Future research directions are previously determined for each attribute.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available