Security issues in cloud computing

Huaglory Tianfield*

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    86 Citations (Scopus)

    Abstract

    This paper presents a comprehensive study on the challenges and issues of security in cloud computing. We first look into the impacts of the distinctive characteristics of cloud computing, namely, multi-tenancy, elasticity and third party control, upon the security requirements. Then, we analyze the cloud security requirements in terms of the fundamental issues, i.e., confidentiality, integrity, availability, trust, and audit and compliance. Furthermore, we discuss the taxonomy for security issues in cloud computing. Finally, we summarize the security issues in cloud computing by a cloud security architecture.

    Original languageEnglish
    Title of host publication2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC)
    PublisherIEEE
    Pages1082-1089
    Number of pages8
    ISBN (Electronic)9781467317146
    ISBN (Print)9781467317139
    DOIs
    Publication statusPublished - 13 Dec 2012
    Event2012 IEEE International Conference on Systems, Man, and Cybernetics, SMC - Seoul, Korea, Republic of
    Duration: 14 Oct 201217 Oct 2012

    Publication series

    NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
    ISSN (Print)1062-922X

    Conference

    Conference2012 IEEE International Conference on Systems, Man, and Cybernetics, SMC
    Country/TerritoryKorea, Republic of
    CitySeoul
    Period14/10/1217/10/12

    Keywords

    • availability
    • cloud computing
    • cloud security
    • confidentiality
    • elasticity
    • integrity
    • multi-tenancy
    • security

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Control and Systems Engineering
    • Human-Computer Interaction

    Fingerprint

    Dive into the research topics of 'Security issues in cloud computing'. Together they form a unique fingerprint.

    Cite this