Abstract
Cloud computing has many commercial advantages; however, companies tend to avoid trusting cloud service providers (CSPs) with their sensitive data because of the associated risks. Cloud infrastructures can be vulnerable due to a single flaw in any node with networking, computing, storage and authentication services capabilities, which can result in the exposure of vulnerabilities with severe consequences. This paper reviews various recent articles and determines the most prominent security challenges. The paper also includes the critical analysis of existing solutions to determine their limitations. Using these identified limitations, a multi-layered security framework is proposed that can be integrated within cloud components to resolve data, virtualization, access control, insiders and service unavailability challenges. A theoretical evaluation of the framework is also conducted to explore its benefits.
Original language | English |
---|---|
Title of host publication | Proceedings of the 10th International Conference on Utility and Cloud Computing (UCC), (Austin, TX: 5-8 December 2017) |
Subtitle of host publication | Companion Volume for Workshop Materials |
Publisher | Association for Computing Machinery (ACM) |
Pages | 233-238 |
Number of pages | 6 |
ISBN (Electronic) | 9781450351959 |
DOIs | |
Publication status | Published - 5 Dec 2017 |
Event | 10th International Conference on Utility and Cloud Computing - AT&T Hotel and Conference Center, Austin, United States Duration: 5 Dec 2017 → 8 Dec 2017 Conference number: 10 http://www.depts.ttu.edu/cac/conferences/ucc2017/ (Link to Conference Website) |
Conference
Conference | 10th International Conference on Utility and Cloud Computing |
---|---|
Abbreviated title | UCC '17 |
Country/Territory | United States |
City | Austin |
Period | 5/12/17 → 8/12/17 |
Internet address |
|