During the last few years, there has been a rapid and an increasing development and adoption of cloud computing systems, technologies, applications and services. This is owing mainly to many benefits this technology offers for businesses and organizations. However, Cyber-security is considered among the most important issues and concerns for widespread adoption of cloud computing. Among the major issues related with Cloud Computing security we can mention data security, intrusions attacks, confidentiality and data integrity. This paper is dedicated to an overview study of the state of the art of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.
Abstract:Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.
Several cloud computing systems used voting techniques to deal with sabotage issues. However, these techniques become inefficient, and present some new security vulnerabilities when malicious resources collude and return the same wrong result. Usually, this kind of security threats are handled using several techniques and approaches such as voting techniques. In this paper, a very efficient approach to overcome sabotage issues is proposed, especially in the case of very complex attacks. The performances of this approach are evaluated in a cloud system model and it is compared against other voting techniques, like reputation-based voting, using simulations which allowed to investigate the effect of collusive cloud resources on the correctness of the results. The obtained results show that the proposed approach achieves lower error rates and enhanced performances in terms of overhead and slowdown.
General TermsCyber-security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.