Abstract
Original language | English |
---|---|
Title of host publication | Proceedings of the 10th International Conference on Utility and Cloud Computing (UCC), (Austin, TX: 5-8 December 2017) |
Subtitle of host publication | Companion Volume for Workshop Materials |
Publisher | Association for Computing Machinery (ACM) |
Pages | 233-238 |
Number of pages | 6 |
ISBN (Electronic) | 9781450351959 |
DOIs | |
Publication status | Published - 5 Dec 2017 |
Event | 10th International Conference on Utility and Cloud Computing - AT&T Hotel and Conference Center, Austin, United States Duration: 5 Dec 2017 → 8 Dec 2017 Conference number: 10 http://www.depts.ttu.edu/cac/conferences/ucc2017/ (Link to Conference Website) |
Conference
Conference | 10th International Conference on Utility and Cloud Computing |
---|---|
Abbreviated title | UCC '17 |
Country | United States |
City | Austin |
Period | 5/12/17 → 8/12/17 |
Internet address |
|
Fingerprint
Cite this
}
A Multi-layered Cloud Protection Framework. / Khan, Saad; Parkinson, Simon; Crampton, Andrew.
Proceedings of the 10th International Conference on Utility and Cloud Computing (UCC), (Austin, TX: 5-8 December 2017): Companion Volume for Workshop Materials. Association for Computing Machinery (ACM), 2017. p. 233-238.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
TY - GEN
T1 - A Multi-layered Cloud Protection Framework
AU - Khan, Saad
AU - Parkinson, Simon
AU - Crampton, Andrew
PY - 2017/12/5
Y1 - 2017/12/5
N2 - Cloud computing has many commercial advantages; however, companies tend to avoid trusting cloud service providers (CSPs) with their sensitive data because of the associated risks. Cloud infrastructures can be vulnerable due to a single flaw in any node with networking, computing, storage and authentication services capabilities, which can result in the exposure of vulnerabilities with severe consequences. This paper reviews various recent articles and determines the most prominent security challenges. The paper also includes the critical analysis of existing solutions to determine their limitations. Using these identified limitations, a multi-layered security framework is proposed that can be integrated within cloud components to resolve data, virtualization, access control, insiders and service unavailability challenges. A theoretical evaluation of the framework is also conducted to explore its benefits.
AB - Cloud computing has many commercial advantages; however, companies tend to avoid trusting cloud service providers (CSPs) with their sensitive data because of the associated risks. Cloud infrastructures can be vulnerable due to a single flaw in any node with networking, computing, storage and authentication services capabilities, which can result in the exposure of vulnerabilities with severe consequences. This paper reviews various recent articles and determines the most prominent security challenges. The paper also includes the critical analysis of existing solutions to determine their limitations. Using these identified limitations, a multi-layered security framework is proposed that can be integrated within cloud components to resolve data, virtualization, access control, insiders and service unavailability challenges. A theoretical evaluation of the framework is also conducted to explore its benefits.
KW - Cloud security
KW - Encryption
KW - Multi-tenancy
KW - Authentication
UR - https://dl.acm.org/citation.cfm?id=3147234
U2 - 10.1145/3147234.3148098
DO - 10.1145/3147234.3148098
M3 - Conference contribution
SP - 233
EP - 238
BT - Proceedings of the 10th International Conference on Utility and Cloud Computing (UCC), (Austin, TX: 5-8 December 2017)
PB - Association for Computing Machinery (ACM)
ER -