Requirements Capture and Comparative Analysis of Cloud Security Techniques

Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim
2015 International Journal of Grid and Distributed Computing  
Convergence and ubiquity are the key characteristics of tomorrow's service provision infrastructures. Today, Cloud architectures offer cost-efficient backbones that support transmission, storage, and computing of applications contents. These architectures can be used for business, scientific, and other computing purposes. However, the diversity of these services, delivered through Cloud infrastructures, increases its vulnerability to security incidents and attacks. The requirements for cost and
more » ... complexity reduction make the design and development of protection mechanisms even more challenging. Furthermore, key design features such as confidentiality, privacy, authentication, anonymity, survivability, dependability, and fault-tolerance can be even more difficult to provide. The aim of this paper is to present the state-of-the-art Cloud security and to explore research directions and technology trends to address the protection of Cloud infrastructures. To do so, we are going to explore the fundamental concepts of Cloud computing security, notably, its principles, vulnerabilities, requirements, and mechanisms. There are various issues that need to be dealt with respect to security and privacy in a Cloud computing scenario. In this paper, the fundamental concepts of Cloud computing security will be explored, notably, its principles, vulnerabilities, requirements, and mechanisms.
doi:10.14257/ijgdc.2015.8.2.25 fatcat:2vjojoyr5be7xpc7kal77mssqy