Surveying and Analyzing Security Problems in Cloud Computing Environments
Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to consumers. Cloud Computing offers a whole new paradigm to provide users with high end and scalable infrastructure at an affordable cost. It is based...
        Saved in:
      
    
          | Published in | 2014 Tenth International Conference on Computational Intelligence and Security pp. 689 - 693 | 
|---|---|
| Main Authors | , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.11.2014
     | 
| Subjects | |
| Online Access | Get full text | 
| DOI | 10.1109/CIS.2014.169 | 
Cover
| Abstract | Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to consumers. Cloud Computing offers a whole new paradigm to provide users with high end and scalable infrastructure at an affordable cost. It is based on many new technologies like virtualization and distributed computing. However, security concerns are terrible for these systems whose infrastructure and computational resources are owned by an outside party that sells those services to the general public. In fact, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the cloud architecture. We present in this paper a detailed analysis of the cloud computing security issues and the general security requirements into which the security concerns falls. In addition, countermeasures to cloud security breaches are proposed. | 
    
|---|---|
| AbstractList | Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to consumers. Cloud Computing offers a whole new paradigm to provide users with high end and scalable infrastructure at an affordable cost. It is based on many new technologies like virtualization and distributed computing. However, security concerns are terrible for these systems whose infrastructure and computational resources are owned by an outside party that sells those services to the general public. In fact, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the cloud architecture. We present in this paper a detailed analysis of the cloud computing security issues and the general security requirements into which the security concerns falls. In addition, countermeasures to cloud security breaches are proposed. | 
    
| Author | Ben Arfa Rabai, Latifa Jouini, Mouna  | 
    
| Author_xml | – sequence: 1 givenname: Mouna surname: Jouini fullname: Jouini, Mouna email: jouini.mouna@yahoo.fr organization: Dept. of Comput. Sci., ISG, Tunis, Tunisia – sequence: 2 givenname: Latifa surname: Ben Arfa Rabai fullname: Ben Arfa Rabai, Latifa email: latifa.rabai@isg.rnu.tn organization: Dept. of Comput. Sci., ISG, Tunis, Tunisia  | 
    
| BookMark | eNotj0tLw0AYRUdQUGt27tzMH0ic92NZQtVAQSG6LpPMNzKQTEoehfjrbdHV5XIuB-49uk5DAoQeKSkoJfa5rOqCESoKquwVyqw2VGhrteBc36JsmmJDmNJKKCPuUFUv4wnWmL6xSx5vk-vWn0uroV3GOK_4YxyaDvoJx4TLblg8Lof-uMyX0S6d4jikHtI8PaCb4LoJsv_coK-X3Wf5lu_fX6tyu88j1XLOmdTCtZQo6wOXjjXKBWqcV0YBWG_AnokMgnvVBOpVMIxJop2wQWjTWr5BT3_eCACH4xh7N64HTc53jeS_3u5NLQ | 
    
| CODEN | IEEPAD | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/CIS.2014.169 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings Accès ENAC - IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EISBN | 9781479974337 147997434X 1479974331 9781479974344  | 
    
| EndPage | 693 | 
    
| ExternalDocumentID | 7016985 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IL ALMA_UNASSIGNED_HOLDINGS CBEJK RIB RIC RIE RIL  | 
    
| ID | FETCH-LOGICAL-i175t-2574ac1069df35a2b6af18ad686ee9d8e969d5f43d6bf1d6f822507a49f478c93 | 
    
| IEDL.DBID | RIE | 
    
| IngestDate | Wed Dec 20 05:19:54 EST 2023 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i175t-2574ac1069df35a2b6af18ad686ee9d8e969d5f43d6bf1d6f822507a49f478c93 | 
    
| PageCount | 5 | 
    
| ParticipantIDs | ieee_primary_7016985 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2014-Nov. | 
    
| PublicationDateYYYYMMDD | 2014-11-01 | 
    
| PublicationDate_xml | – month: 11 year: 2014 text: 2014-Nov.  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | 2014 Tenth International Conference on Computational Intelligence and Security | 
    
| PublicationTitleAbbrev | CIS | 
    
| PublicationYear | 2014 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssib026764684 | 
    
| Score | 1.6588771 | 
    
| Snippet | Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 689 | 
    
| SubjectTerms | Availability Cloud computing cloud risks Privacy Security security challenges security requirements Servers threat and countermeasures Virtual machining Virtualization  | 
    
| Title | Surveying and Analyzing Security Problems in Cloud Computing Environments | 
    
| URI | https://ieeexplore.ieee.org/document/7016985 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09a8MwEBVJpk5tSUq_0dCxdhxZkqXZJCSFlEIayBYs3wlCi1NSu0N-fSU7H6V06GZZMhY6ibuz37tHyAO3BhNmo0BxEAGPcwg0Sh1oSCIBUjMLnig8fZbjOX9aiEWLPB64MIhYg88w9Jf1v3xY55X_VNZPfOkQJdqknSjZcLX2e4fJRHKp-AHbrvvpZOahWzwc1Gjmo3ZK7TpGp2S6f2mDGHkLq9KE-fZXPcb_zuqM9I4kPfpycD_npIVFl0xm1eYLPXWJZgXQuuTI1rdmO506_4hXkPmkq4Km7-sKaCPs4AcNf7DeemQ-Gr6m42CnlhCsXAhQBu7s8Sx3GZ4GG4uMGZnZgcpAKomoQaF2PcLyGKSxA5DWhQYuGMy4tjxRuY4vSKdYF3hJqERgSQQuU2QRxxhVFGe5i-xibrgwTF6Rrl-G5UdTEGO5W4Hrv2_fkBNvhobAd0s65abCO-fJS3Nfm_AbViKfxw | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsAEqEV8k4GRpGlyduy5atVCWyG1lbpVSXyWEChFJWHor8dO-oEQA1scO4rls3V3yXv3AB5QJxQF2ncFKuZimCpXEpeuVJHPFJeBVpYoPBrz_gyf5mxeg8cdF4aISvAZefay_JevlmlhP5W1Ils6RLADOGSIyCq21nb3BDziyAXu0O2y1RlMLHgLvXaJZ96rp5TOo3cCo-1rK8zIm1fkiZeuf1Vk_O-8TqG5p-k5LzsHdAY1yhowmBSrL7LkJSfOlFMWHVnb1mSjVGcfsRoyn85r5nTel4VyKmkHO6j7g_fWhFmvO-303Y1egvtqgoDcNacP49TkeFLpkMVBwmPdFrHighNJJUiaHqYxVDzRbcW1CQ5MOBij1BiJVIbnUM-WGV2Aw0kFka9Mrhj4SCEJP4xTE9uFmCBLAn4JDbsMi4-qJMZiswJXf9--h6P-dDRcDAfj52s4tiap6Hw3UM9XBd0av54nd6U5vwHkyqMU | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Tenth+International+Conference+on+Computational+Intelligence+and+Security&rft.atitle=Surveying+and+Analyzing+Security+Problems+in+Cloud+Computing+Environments&rft.au=Jouini%2C+Mouna&rft.au=Ben+Arfa+Rabai%2C+Latifa&rft.date=2014-11-01&rft.pub=IEEE&rft.spage=689&rft.epage=693&rft_id=info:doi/10.1109%2FCIS.2014.169&rft.externalDocID=7016985 |