2010 IEEE 34th Annual Computer Software and Applications Conference Workshops 2010
DOI: 10.1109/compsacw.2010.74
|View full text |Cite
|
Sign up to set email alerts
|

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments

Abstract: Abstract-Cloud computing has recently gained tremendous momentum but still is in its infancy. It has the potential for significant cost reduction and the increased operating efficiencies in computing. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper, we propose a comprehensive security framework for cloud computing environments. We also discuss challenges, existing solutions, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 116 publications
(54 citation statements)
references
References 12 publications
0
54
0
Order By: Relevance
“…Well-known static models include the 7-layer security model [2], SACS mode l [3], trust-based model [4], and so on. Dynamic models mainly include authentication-monitor model [5] and service composition model [6].…”
Section: A Security Modelsmentioning
confidence: 99%
“…Well-known static models include the 7-layer security model [2], SACS mode l [3], trust-based model [4], and so on. Dynamic models mainly include authentication-monitor model [5] and service composition model [6].…”
Section: A Security Modelsmentioning
confidence: 99%
“…Its unavailability may occur in a physical way, as the failure of critical network components, power disruptions, and physical plant disruptions, either malicious or natural (Firesmith 2004;Takabi et al 2010). Availability can also be impacted in a logical way, in the form of improper addressing or routing, and through the use of DenialOf-Service attacks, which are the deliberate insertion of unwanted data into the network (Brock and Goscinski 2010).…”
Section: Availabilitymentioning
confidence: 99%
“…Several frameworks have addressed cloud security in general (Brock and Goscinski 2010;Firesmith 2004;Takabi et al 2010;Zissis and Lekkas 2012), and cloud storage in particular (Mapp et al 2014). Researchers have also applied security components as specific objectives.…”
Section: Cloud Security Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Zhang et al [1] propose their Usage-Based Security Framework (UBSF) which can consolidate guidelines and policies with their framework, architecture and digital certificates. Takabi et al [2] describe their comprehensive security framework by presenting a model to explain how to work with different service integrators and service providers. Zia and Zomaya [3] present their wireless sensor networks model with their algorithms and a software engineering approach.…”
Section: Introductionmentioning
confidence: 99%