Surveying and Analyzing Security Problems in Cloud Computing Environments

Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to consumers. Cloud Computing offers a whole new paradigm to provide users with high end and scalable infrastructure at an affordable cost. It is based...

Full description

Saved in:
Bibliographic Details
Published in2014 Tenth International Conference on Computational Intelligence and Security pp. 689 - 693
Main Authors Jouini, Mouna, Ben Arfa Rabai, Latifa
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2014
Subjects
Online AccessGet full text
DOI10.1109/CIS.2014.169

Cover

Abstract Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to consumers. Cloud Computing offers a whole new paradigm to provide users with high end and scalable infrastructure at an affordable cost. It is based on many new technologies like virtualization and distributed computing. However, security concerns are terrible for these systems whose infrastructure and computational resources are owned by an outside party that sells those services to the general public. In fact, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the cloud architecture. We present in this paper a detailed analysis of the cloud computing security issues and the general security requirements into which the security concerns falls. In addition, countermeasures to cloud security breaches are proposed.
AbstractList Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to consumers. Cloud Computing offers a whole new paradigm to provide users with high end and scalable infrastructure at an affordable cost. It is based on many new technologies like virtualization and distributed computing. However, security concerns are terrible for these systems whose infrastructure and computational resources are owned by an outside party that sells those services to the general public. In fact, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the cloud architecture. We present in this paper a detailed analysis of the cloud computing security issues and the general security requirements into which the security concerns falls. In addition, countermeasures to cloud security breaches are proposed.
Author Ben Arfa Rabai, Latifa
Jouini, Mouna
Author_xml – sequence: 1
  givenname: Mouna
  surname: Jouini
  fullname: Jouini, Mouna
  email: jouini.mouna@yahoo.fr
  organization: Dept. of Comput. Sci., ISG, Tunis, Tunisia
– sequence: 2
  givenname: Latifa
  surname: Ben Arfa Rabai
  fullname: Ben Arfa Rabai, Latifa
  email: latifa.rabai@isg.rnu.tn
  organization: Dept. of Comput. Sci., ISG, Tunis, Tunisia
BookMark eNotj0tLw0AYRUdQUGt27tzMH0ic92NZQtVAQSG6LpPMNzKQTEoehfjrbdHV5XIuB-49uk5DAoQeKSkoJfa5rOqCESoKquwVyqw2VGhrteBc36JsmmJDmNJKKCPuUFUv4wnWmL6xSx5vk-vWn0uroV3GOK_4YxyaDvoJx4TLblg8Lof-uMyX0S6d4jikHtI8PaCb4LoJsv_coK-X3Wf5lu_fX6tyu88j1XLOmdTCtZQo6wOXjjXKBWqcV0YBWG_AnokMgnvVBOpVMIxJop2wQWjTWr5BT3_eCACH4xh7N64HTc53jeS_3u5NLQ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CIS.2014.169
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
Accès ENAC - IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781479974337
147997434X
1479974331
9781479974344
EndPage 693
ExternalDocumentID 7016985
Genre orig-research
GroupedDBID 6IE
6IL
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-2574ac1069df35a2b6af18ad686ee9d8e969d5f43d6bf1d6f822507a49f478c93
IEDL.DBID RIE
IngestDate Wed Dec 20 05:19:54 EST 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-2574ac1069df35a2b6af18ad686ee9d8e969d5f43d6bf1d6f822507a49f478c93
PageCount 5
ParticipantIDs ieee_primary_7016985
PublicationCentury 2000
PublicationDate 2014-Nov.
PublicationDateYYYYMMDD 2014-11-01
PublicationDate_xml – month: 11
  year: 2014
  text: 2014-Nov.
PublicationDecade 2010
PublicationTitle 2014 Tenth International Conference on Computational Intelligence and Security
PublicationTitleAbbrev CIS
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib026764684
Score 1.6588771
Snippet Cloud computing technology is a relatively new concept of providing dramatically scalable and virtualized resources, software and hardware on demand to...
SourceID ieee
SourceType Publisher
StartPage 689
SubjectTerms Availability
Cloud computing
cloud risks
Privacy
Security
security challenges
security requirements
Servers
threat and countermeasures
Virtual machining
Virtualization
Title Surveying and Analyzing Security Problems in Cloud Computing Environments
URI https://ieeexplore.ieee.org/document/7016985
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09a8MwEBVJpk5tSUq_0dCxdhxZkqXZJCSFlEIayBYs3wlCi1NSu0N-fSU7H6V06GZZMhY6ibuz37tHyAO3BhNmo0BxEAGPcwg0Sh1oSCIBUjMLnig8fZbjOX9aiEWLPB64MIhYg88w9Jf1v3xY55X_VNZPfOkQJdqknSjZcLX2e4fJRHKp-AHbrvvpZOahWzwc1Gjmo3ZK7TpGp2S6f2mDGHkLq9KE-fZXPcb_zuqM9I4kPfpycD_npIVFl0xm1eYLPXWJZgXQuuTI1rdmO506_4hXkPmkq4Km7-sKaCPs4AcNf7DeemQ-Gr6m42CnlhCsXAhQBu7s8Sx3GZ4GG4uMGZnZgcpAKomoQaF2PcLyGKSxA5DWhQYuGMy4tjxRuY4vSKdYF3hJqERgSQQuU2QRxxhVFGe5i-xibrgwTF6Rrl-G5UdTEGO5W4Hrv2_fkBNvhobAd0s65abCO-fJS3Nfm_AbViKfxw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsAEqEV8k4GRpGlyduy5atVCWyG1lbpVSXyWEChFJWHor8dO-oEQA1scO4rls3V3yXv3AB5QJxQF2ncFKuZimCpXEpeuVJHPFJeBVpYoPBrz_gyf5mxeg8cdF4aISvAZefay_JevlmlhP5W1Ils6RLADOGSIyCq21nb3BDziyAXu0O2y1RlMLHgLvXaJZ96rp5TOo3cCo-1rK8zIm1fkiZeuf1Vk_O-8TqG5p-k5LzsHdAY1yhowmBSrL7LkJSfOlFMWHVnb1mSjVGcfsRoyn85r5nTel4VyKmkHO6j7g_fWhFmvO-303Y1egvtqgoDcNacP49TkeFLpkMVBwmPdFrHighNJJUiaHqYxVDzRbcW1CQ5MOBij1BiJVIbnUM-WGV2Aw0kFka9Mrhj4SCEJP4xTE9uFmCBLAn4JDbsMi4-qJMZiswJXf9--h6P-dDRcDAfj52s4tiap6Hw3UM9XBd0av54nd6U5vwHkyqMU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Tenth+International+Conference+on+Computational+Intelligence+and+Security&rft.atitle=Surveying+and+Analyzing+Security+Problems+in+Cloud+Computing+Environments&rft.au=Jouini%2C+Mouna&rft.au=Ben+Arfa+Rabai%2C+Latifa&rft.date=2014-11-01&rft.pub=IEEE&rft.spage=689&rft.epage=693&rft_id=info:doi/10.1109%2FCIS.2014.169&rft.externalDocID=7016985