logo

State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions

8 Pages2771 Words253 Views
   

Added on  2019-10-31

State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions

   Added on 2019-10-31

ShareRelated Documents
Running Head: EMERGING TECHNOLOGIES AND INNOVATION: CLOUD SECURITY, ANANNOTATED BIBLIOGRAPHY 1Emerging Technologies And Innovation: Cloud Security, An AnnotatedBibliographyNameDate
State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions_1
Running Head: EMERGING TECHNOLOGIES AND INNOVATION: CLOUD SECURITY, ANANNOTATED BIBLIOGRAPHY 2Shahzad, F. (January 01, 2014). State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions. Procedia Computer Science, 37, 357-362.The author, in conducting the survey, recognizes and acknowledges the numerous benefits ofcloud computing and how it has revolutionized computing while allowing any organization or person to enjoy the services cost-effectively. Using a critical review of research literature and case studies, the author investigates some of the problems with cloud computing, and specifically focuses on security issues as a challenge in cloud computing. The author does anexcellent job of identifying the various types and classes of security risks with cloud computing and goes a step further to discuss some of the approaches to these problems, as well as solutions. By undertaking case studies on major cloud services providers, such as AWS (Amazon Web Services), the author evaluates how they ensure security and the effectiveness of the methods/ approaches they use. The article is well researched, concise, and provides insights on why cloud computing is popular, the challenges faced, specifically security, approaches to tackle the challenges, and methods that can be employed. Hashizume, Keiko, Rosado, David G, Fernández-Medina, Eduardo, & Fernandez, Eduardo B.(2013). An analysis of security issues for cloud computing. (BioMed Central Ltd.) BioMed Central Ltd.The authors acknowledge that because of the many benefits to cloud computing, its adoptionand use is growing tremendously across many sectors and industries. The authors also acknowledge that its architecture and model presents an added risk level, given that third parties are contracted to handle sensitive information on behalf of the clients. This makes it difficult to maintain privacy and security and be assured (in a demonstrable way) of security compliance. Using a systematic review of literature, the authors identify and analyze the present state of cloud computing and the most important security issues in cloud computing. The authors research extensively and identify, analyze, and summarize the most important current security issues in the cloud. This article is important for the purposes of understanding the important security issues in cloud computing as it is a systematic review of several research articles. The article provides, in a nutshell and summarized manner, a non technical overview of the current important cloud security risks. Kritikos, K., & Massonet, P. (January 01, 2016). An Integrated Meta-model for Cloud ApplicationSecurity Modelling. Procedia Computer Science, 97, 84-93.
State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions_2
Running Head: EMERGING TECHNOLOGIES AND INNOVATION: CLOUD SECURITY, ANANNOTATED BIBLIOGRAPHY 3In this article, the authors discuss, using a literature review and their own knowledge, the issue of cloud security modeling with respect to MDE (model driven engineering). MDE is anew approach to cloud services that offers numerous promises to automate the management phases of cloud applications, including deployment as well as adaptive provisioning. The authors recognize that every new technology or approach to better cloud provisioning has itssecurity challenges. The authors let us know that most MDE approaches have neglected the security aspect, yet security is an important factor for cloud migration. Being well versed in the area as professionals, the authors provide a functional model for modeling for cloud application security. This article is very useful for the proposed research as it offers a practical perspective on modeling cloud security risks in MDE cloud application management approach. The authors also research works by peers extensivelyJouini, M., & Ben, A. R. L. (January 01, 2016). Comparative Study of Information Security RiskAssessment Models for Cloud Computing systems. Procedia Computer Science, 83, 1084-1089.The authors use an extensive and systematic review of literature as well as a comparative study to review the state of the art in methods and approaches in in risk assessment of cloud computing systems. The authors select and scrutinize in detail, the available/ developed quantitative models for cloud security risk assessment. After reviewing the quantitative cloud security risk assessment models, the authors undertake a comparative analysis of the systems to establish their merits and limitations. The research is important since, whilst identifying and managing cloud security risks is important, it provides a basis for quantitatively assessing risks and describes the limitations of the models. This is important in better understanding security risks in the cloud because the model used can determine whether the important risks are identified and dealt with. This paper also acknowledges and evaluates the limitations of some risk assessment models. The findings are important for cloud security as they offer a means for effective security risk profiling in cloud computing environments. Khan, N., Al-Yasiri, A., & 11th International Conference on Future Networks and Communications,FNC 2016 / 13th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2016. (January 01, 2016). Identifying Cloud Security Threats to Strengthen CloudComputing Adoption Framework. Procedia Computer Science, 94, 485-490.
State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Professional Skills in Information Communication Technology
|4
|1090
|38

Pros and Cons of Cloud Computing
|5
|1193
|117

Cloud Computing Security Challenges
|15
|4893
|403

Cloud Computing Technology and Application: A Comparison of Major Vendors-Proposal
|11
|559
|144

Cloud Computing Benefits, Issues and Challenges
|6
|953
|256

Cloud computing.
|7
|431
|44