Abstract
Convergence and ubiquity are the key characteristics of tomorrow’s service provision infrastructures. Today, Cloud architectures offer cost-efficient backbones that support transmission, storage, and computing of applications contents. These architectures can be used for business, scientific, and other computing purposes. However, the diversity of these services, delivered through Cloud infrastructures, increases its vulnerability to security incidents and attacks. The requirements for cost and complexity reduction make the design and development of protection mechanisms even more challenging. Furthermore, key design features such as confidentiality, privacy, authentication, anonymity, survivability, dependability, and fault-tolerance can be even more difficult to provide. The aim of this paper is to present the state-of-the-art Cloud security and to explore research directions and technology trends to address the protection of Cloud infrastructures. To do so, we are going to explore the fundamental concepts of Cloud computing security, notably, its principles, vulnerabilities, requirements, and mechanisms.
Author supplied keywords
Cite
CITATION STYLE
Medhioub, M., Hamdi, M., & Kim, T. H. (2015). Requirements capture and comparative analysis of cloud security techniques. International Journal of Grid and Distributed Computing, 8(2), 285–308. https://doi.org/10.14257/ijgdc.2015.8.2.25
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.