TY - JOUR
T1 - A survey on cloud computing security
T2 - Issues, threats, and solutions
AU - Singh, Saurabh
AU - Jeong, Young Sik
AU - Park, Jong Hyuk
N1 - Publisher Copyright:
© 2016 Elsevier Ltd
PY - 2016/11/1
Y1 - 2016/11/1
N2 - Over the internet, the cloud computing reveals a remarkable potential to provide on-demand services to consumers with greater flexibility in a cost effective manner. While moving towards the concept of on-demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability. This survey present a comprehensive overview of the security issues for different factors affecting cloud computing. Furthermore, a detailed discussion on several key topics regarding embedded system, application, storage system, clustering related issues and many more. This paper works on some public cloud and private cloud authorities as well as related security concerns. Additionally, it encompasses the requirements for better security management and suggests 3-tier security architecture. Open issues with discussion in which some new security concepts and recommendations are also provided.
AB - Over the internet, the cloud computing reveals a remarkable potential to provide on-demand services to consumers with greater flexibility in a cost effective manner. While moving towards the concept of on-demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability. This survey present a comprehensive overview of the security issues for different factors affecting cloud computing. Furthermore, a detailed discussion on several key topics regarding embedded system, application, storage system, clustering related issues and many more. This paper works on some public cloud and private cloud authorities as well as related security concerns. Additionally, it encompasses the requirements for better security management and suggests 3-tier security architecture. Open issues with discussion in which some new security concepts and recommendations are also provided.
KW - Cloud computing
KW - Embedded system
KW - Resource pooling
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84987852363&partnerID=8YFLogxK
U2 - 10.1016/j.jnca.2016.09.002
DO - 10.1016/j.jnca.2016.09.002
M3 - Article
AN - SCOPUS:84987852363
SN - 1084-8045
VL - 75
SP - 200
EP - 222
JO - Journal of Network and Computer Applications
JF - Journal of Network and Computer Applications
ER -