Requirements capture and comparative analysis of cloud security techniques

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Convergence and ubiquity are the key characteristics of tomorrow’s service provision infrastructures. Today, Cloud architectures offer cost-efficient backbones that support transmission, storage, and computing of applications contents. These architectures can be used for business, scientific, and other computing purposes. However, the diversity of these services, delivered through Cloud infrastructures, increases its vulnerability to security incidents and attacks. The requirements for cost and complexity reduction make the design and development of protection mechanisms even more challenging. Furthermore, key design features such as confidentiality, privacy, authentication, anonymity, survivability, dependability, and fault-tolerance can be even more difficult to provide. The aim of this paper is to present the state-of-the-art Cloud security and to explore research directions and technology trends to address the protection of Cloud infrastructures. To do so, we are going to explore the fundamental concepts of Cloud computing security, notably, its principles, vulnerabilities, requirements, and mechanisms.

Cite

CITATION STYLE

APA

Medhioub, M., Hamdi, M., & Kim, T. H. (2015). Requirements capture and comparative analysis of cloud security techniques. International Journal of Grid and Distributed Computing, 8(2), 285–308. https://doi.org/10.14257/ijgdc.2015.8.2.25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free