TY - GEN
T1 - Security concerns in cloud computing
AU - Khalil, Issa M.
AU - Khreishah, Abdallah
AU - Bouktif, Salah
AU - Ahmad, Azeem
PY - 2013
Y1 - 2013
N2 - The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.
AB - The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.
KW - Classification Scheme
KW - Cloud Computing Attacks
KW - Cloud Computing Security
KW - Security Threats
UR - http://www.scopus.com/inward/record.url?scp=84886682232&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84886682232&partnerID=8YFLogxK
U2 - 10.1109/ITNG.2013.127
DO - 10.1109/ITNG.2013.127
M3 - Conference contribution
AN - SCOPUS:84886682232
SN - 9780769549675
T3 - Proceedings of the 2013 10th International Conference on Information Technology: New Generations, ITNG 2013
SP - 411
EP - 416
BT - Proceedings of the 2013 10th International Conference on Information Technology
T2 - 2013 10th International Conference on Information Technology: New Generations, ITNG 2013
Y2 - 15 April 2013 through 17 April 2013
ER -