메뉴 건너뛰기




Volumn 3, Issue 1, 2014, Pages

Cloud computing security: A survey

Author keywords

Attacks; Cloud computing; Cloud security; Insider attackers; Security vulnerabilities; Threats

Indexed keywords


EID: 85063830027     PISSN: None     EISSN: 2073431X     Source Type: Journal    
DOI: 10.3390/computers3010001     Document Type: Article
Times cited : (214)

References (105)
  • 6
    • 84857184370 scopus 로고    scopus 로고
    • Patidar, S. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment
    • Mumbai, India, 11– 14 December 2011
    • Jain, P.; Rane, D.; Patidar, S. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment. In Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), Mumbai, India, 11– 14 December 2011; pp. 456–461.
    • Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT) , pp. 456-461
    • Jain, P.1    Rane, D.2
  • 11
    • 84861957968 scopus 로고    scopus 로고
    • Towards secure and dependable storage services in cloud computing
    • Wang, C.; Wang, Q.; Ren, K.; Lou, W. Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 2012, 5, 220–232.
    • (2012) IEEE Trans. Serv. Comput. , vol.5 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 14
    • 79957590723 scopus 로고    scopus 로고
    • ELMO: Energy aware local monitoring in sensor networks
    • Khalil, I.M. ELMO: Energy aware local monitoring in sensor networks. IEEE Trans. Dependable Secur. Comput. 2011, 8, 523–536.
    • (2011) IEEE Trans. Dependable Secur. Comput. , vol.8 , pp. 523-536
    • Khalil, I.M.1
  • 18
    • 70449512359 scopus 로고    scopus 로고
    • SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks
    • 2009, ISCC 2009, Sousse, 5–8 July 2009
    • Khalil, I.; Hayajneh, M.; Awad, M. SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks. In Proceedings of the IEEE Symposium on Computers and Communications, 2009, ISCC 2009, Sousse, 5–8 July 2009; pp. 368–373.
    • Proceedings of the IEEE Symposium on Computers and Communications , pp. 368-373
    • Khalil, I.1    Hayajneh, M.2    Awad, M.3
  • 27
    • 33644848799 scopus 로고    scopus 로고
    • The status of method: Flexibility, consistency and coherence
    • Holloway, I.; Todres, L. The status of method: Flexibility, consistency and coherence. Qual. Res. 2003, 3, 345–357.
    • (2003) Qual. Res. , vol.3 , pp. 345-357
    • Holloway, I.1    Todres, L.2
  • 29
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis, D.; Lekkas, D. Addressing cloud computing security issues. Future Gener. Comput. Syst. 2012, 28, 583–592.
    • (2012) Future Gener. Comput. Syst. , vol.28 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 31
    • 33750505977 scopus 로고    scopus 로고
    • Using thematic analysis in psychology
    • Braun, V.; Clarke, V. Using thematic analysis in psychology. Qual. Res. Psychol. 2006, 3, 77–101.
    • (2006) Qual. Res. Psychol. , vol.3 , pp. 77-101
    • Braun, V.1    Clarke, V.2
  • 32
    • 85063832415 scopus 로고    scopus 로고
    • accessed on 18 March 2012
    • A Survey on Cloud Computing Security, Challenges and Threats|Whitepapers|TechRepublic. Available online: http://www.techrepublic.com/whitepapers/a-survey-on-cloud-computing-security-challenges-and-threats/3483757 (accessed on 18 March 2012).
  • 38
    • 85063816891 scopus 로고    scopus 로고
    • accessed on 18 March 2012
    • Who Can You Trust in the Cloud? A Review of Security Issues within Cloud Computing. Available online: http://www.drjeffdaniels.com/1/post/2011/10/who-can-you-trust-in-the-cloud-a-review-of-security-issues-within-cloud-computing.html (accessed on 18 March 2012).
    • A Review of Security Issues within Cloud Computing
  • 40
    • 84857170570 scopus 로고    scopus 로고
    • Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation
    • Mumbai, India, 11–14 December 2011
    • Behl, A. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), Mumbai, India, 11–14 December 2011; pp. 217–222.
    • Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT) , pp. 217-222
    • Behl, A.1
  • 53
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • Khorshed, M.T.; Ali, A.B.M.S.; Wasimi, S.A. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 2012, 28, 833–851.
    • (2012) Future Gener. Comput. Syst. , vol.28 , pp. 833-851
    • Khorshed, M.T.1    Ali, A.B.M.S.2    Wasimi, S.A.3
  • 58
    • 85063835809 scopus 로고    scopus 로고
    • Top Threats to Cloud Computing V1.0; Cloud Security Alliance: March 2010
    • Top Threats to Cloud Computing V1.0; Cloud Security Alliance: March 2010.
  • 61
    • 84869744639 scopus 로고    scopus 로고
    • A self-protection mechanism against stepping-stone attacks for IaaS clouds
    • Kourai, K.; Azumi, T.; Chiba, S. A self-protection mechanism against stepping-stone attacks for IaaS clouds. In Proceedings of the UIC/ATC, 2012; pp. 539–546.
    • (2012) In Proceedings of the UIC/ATC , pp. 539-546
    • Kourai, K.1    Azumi, T.2    Chiba, S.3
  • 64
    • 84871986666 scopus 로고    scopus 로고
    • Defending against web application vulnerabilities
    • Antunes, N.; Vieira, M. Defending against web application vulnerabilities. Computer 2012, 45, 66–72.
    • (2012) Computer , vol.45 , pp. 66-72
    • Antunes, N.1    Vieira, M.2
  • 66
    • 85063839265 scopus 로고    scopus 로고
    • accessed on: Feb 1, 2014
    • Zeus Bot Found Using Amazon’s EC2 as C&C Server. Available online: http://www.theregister.co.uk/2009/12/09/amazon ec2 bot control channel/(accessed on: Feb 1, 2014).
    • Zeus Bot Found Using Amazon’s EC2 as C&C Server
  • 67
    • 85063846905 scopus 로고    scopus 로고
    • Google Cloud Platform Used for Botnet Control. Available online: http://www.infosecurity-magazine.com/view/5115/google-cloud-platform-used-for-botnet-control/(accessed on: Feb 1, 2014).
  • 68
    • 85063848090 scopus 로고    scopus 로고
    • (accessed on: Feb 1, 2014)
    • Raytheon UK Targeted in Cloud-Based Attack. Available online: http://www.zdnet.co.uk/news/security-threats/2011/10/12/raytheon-uk-targeted-in-cloud-based-attack-40094173/(accessed on: Feb 1, 2014).
  • 69
    • 56549109177 scopus 로고    scopus 로고
    • Tamper-resistant, application-aware blocking of malicious network connections
    • Cambridge, MA, USA, 15–17 September 2008
    • Srivastava, A.; Giffin, J. Tamper-resistant, application-aware blocking of malicious network connections. In Proceedings of the 11th International Symposium, RAID 2008, Cambridge, MA, USA, 15–17 September 2008; pp. 39–58.
    • Proceedings of the 11Th International Symposium, RAID 2008 , pp. 39-58
    • Srivastava, A.1    Giffin, J.2
  • 71
    • 84858773328 scopus 로고    scopus 로고
    • Architectural support for hypervisor-secure virtualization
    • Szefer, J.; Lee, R.B. Architectural support for hypervisor-secure virtualization. SIGARCH Comput. Arch. News 2012, 40, 437–450.
    • (2012) SIGARCH Comput. Arch. News , vol.40 , pp. 437-450
    • Szefer, J.1    Lee, R.B.2
  • 91
    • 85063842989 scopus 로고    scopus 로고
    • accessed on 13 January 2013
    • Revealed: Why Android Beats iPhone for Organized Crime. Available online: http://blogs.computerworld.com/16392/security_android_beats_iphone_for_crime(accessed on 13 January 2013).
    • Revealed: Why Android Beats Iphone for Organized Crime
  • 92
    • 85063840186 scopus 로고
    • In Shibboleth
    • Oxford English Dictionary; In Shibboleth; 1989.
    • (1989)
  • 96
    • 85063858134 scopus 로고    scopus 로고
    • accessed on 13 January 2013
    • Kaspersky Security Bulletin. Statistics 2011. Available online: http://www.securelist.com/en/analysis/204792216/Kaspersky_Security_Bulletin_Statistics_2011 (accessed on 13 January 2013).
    • (2011)
  • 102
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • Ren, K.; Wang, C.; Wang, Q. Security challenges for the public cloud. IEEE Internet Comput. 2012, 16, 69–73.
    • (2012) IEEE Internet Comput , vol.16 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 103
    • 53549086979 scopus 로고    scopus 로고
    • Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping
    • January
    • R. K. Panta, S. Bagchi and I. Khalil, “Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping,” Ad Hoc Networks (an Elsevier Journal), Volume 7, Issue 1, January 2009, pp. 42-62.
    • (2009) Ad Hoc Networks (An Elsevier Journal) , vol.7 , Issue.1 , pp. 42-62
    • Panta, R.K.1    Bagchi, S.2    Khalil, I.3
  • 104
    • 79551638042 scopus 로고    scopus 로고
    • MCC: Mitigating colluding collision attacks in wireless sensor networks
    • December 6 – 10, 2010, Miami, Florida, USA
    • I. Khalil, “MCC: Mitigating colluding collision attacks in wireless sensor networks,” Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM’10), December 6 – 10, 2010, Miami, Florida, USA, pp. 1-5..
    • Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM’10) , pp. 1-5
    • Khalil, I.1
  • 105
    • 85063822302 scopus 로고    scopus 로고
    • (Accessed on: Feb 1, 2014)
    • http://blog.scalar.ca/Blog/bid/87248/Mitigating-common-cloud-computing-risks. (Accessed on: Feb 1, 2014).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.