Cloud computing security: A survey of service-based models

Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have inevitably entangled with businesses’ and individuals’ daily lives through products and services. On-demand, pay-per-use characteristics encourage cor...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security Jg. 114; S. 102580
Hauptverfasser: Khoda Parast, Fatemeh, Sindhav, Chandni, Nikam, Seema, Izadi Yekta, Hadiseh, Kent, Kenneth B., Hakak, Saqib
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Amsterdam Elsevier Ltd 01.03.2022
Elsevier Sequoia S.A
Schlagworte:
ISSN:0167-4048, 1872-6208
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have inevitably entangled with businesses’ and individuals’ daily lives through products and services. On-demand, pay-per-use characteristics encourage corporations to outsource part of their businesses to accelerate their services and multiply value. The latest market tendency toward migration to cloud environments, started in 2019, indicates a flourishing trend in the next few years. Despite the numerous benefits of the cloud computing model for businesses or individuals, security issues still have been stated as the top cloud challenge in 2020. Although various factors affect security, technologies enabling cloud computing such as virtualization and multitenancy, in addition to on-demand characteristics, initiate new security entrances for malevolent activities. In this study, we surveyed service-based cloud computing security issues to establish the current state of the field. The main contribution of this paper is to analyze the state of cloud security in the last decade and provide a unified taxonomy of security issues over the three-layer model, i.e., IaaS, PaaS, and SaaS.
AbstractList Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have inevitably entangled with businesses' and individuals' daily lives through products and services. On-demand, pay-per-use characteristics encourage corporations to outsource part of their businesses to accelerate their services and multiply value. The latest market tendency toward migration to cloud environments, started in 2019, indicates a flourishing trend in the next few years. Despite the numerous benefits of the cloud computing model for businesses or individuals, security issues still have been stated as the top cloud challenge in 2020. Although various factors affect security, technologies enabling cloud computing such as virtualization and multitenancy, in addition to on-demand characteristics, initiate new security entrances for malevolent activities. In this study, we surveyed service-based cloud computing security issues to establish the current state of the field. The main contribution of this paper is to analyze the state of cloud security in the last decade and provide a unified taxonomy of security issues over the three-layer model, i.e., IaaS, PaaS, and SaaS.
ArticleNumber 102580
Author Nikam, Seema
Kent, Kenneth B.
Izadi Yekta, Hadiseh
Hakak, Saqib
Sindhav, Chandni
Khoda Parast, Fatemeh
Author_xml – sequence: 1
  givenname: Fatemeh
  surname: Khoda Parast
  fullname: Khoda Parast, Fatemeh
  email: fkhoda@unb.ca
– sequence: 2
  givenname: Chandni
  surname: Sindhav
  fullname: Sindhav, Chandni
  email: csindhav@unb.ca
– sequence: 3
  givenname: Seema
  surname: Nikam
  fullname: Nikam, Seema
  email: snikam@unb.ca
– sequence: 4
  givenname: Hadiseh
  surname: Izadi Yekta
  fullname: Izadi Yekta, Hadiseh
  email: hizadi@unb.ca
– sequence: 5
  givenname: Kenneth B.
  surname: Kent
  fullname: Kent, Kenneth B.
  email: ken@unb.ca
– sequence: 6
  givenname: Saqib
  surname: Hakak
  fullname: Hakak, Saqib
  email: shakak@unb.ca
BookMark eNp9kD1rwzAURUVJoUnaP9DJ0NmpJMuSHLqE0C8IdGlnIUvPRcaxUkkO5N_XwZ06ZHpwuec-OAs0630PCN0TvCKY8Md2ZXyEFcWUjAEtJb5CcyIFzTnFcobmY0nkDDN5gxYxthgTwaWco_W284PNjN8fhuT67yyCGYJLp3W2yeIQjnDKfDOm4egM5LWOYLO9t9DFW3Td6C7C3d9doq-X58_tW777eH3fbna5KahMORWAGdcMW2oZsUZzDWWjubRc1pTVgleAuag1qzmQguGaMKlLVoEUmpSmWKKHafcQ_M8AManWD6EfXyrKiwoXsqJybNGpZYKPMUCjDsHtdTgpgtXZkWrV2ZE6O1KToxGS_yDjkk7O9ylo111GnyZ0NAFHB0FF46A3YF0Ak5T17hL-C9ehgvg
CitedBy_id crossref_primary_10_1007_s00607_025_01479_y
crossref_primary_10_3390_s23125577
crossref_primary_10_1016_j_cie_2024_110237
crossref_primary_10_3390_electronics12091983
crossref_primary_10_4018_IJCAC_308277
crossref_primary_10_1007_s10586_024_05021_1
crossref_primary_10_1109_ACCESS_2025_3529636
crossref_primary_10_1007_s12626_023_00140_4
crossref_primary_10_1007_s11276_024_03863_6
crossref_primary_10_1080_08874417_2024_2329985
crossref_primary_10_3390_app13169161
crossref_primary_10_1002_ett_70120
crossref_primary_10_3390_electronics12030717
crossref_primary_10_32725_ewp_2023_001
crossref_primary_10_3390_info13110544
crossref_primary_10_1007_s42979_023_02285_z
crossref_primary_10_1049_sfw2_6662968
crossref_primary_10_1109_JIOT_2024_3506976
crossref_primary_10_3390_jcp3040034
crossref_primary_10_1007_s11227_025_07571_6
crossref_primary_10_1016_j_techsoc_2025_103057
crossref_primary_10_1088_1402_4896_ad69e0
crossref_primary_10_3390_s22228784
crossref_primary_10_4018_IJACI_332860
crossref_primary_10_1109_TCC_2024_3522993
crossref_primary_10_1109_TSC_2024_3433534
crossref_primary_10_1145_3708533
crossref_primary_10_24017_science_2025_2_4
crossref_primary_10_3389_fcomp_2025_1595624
crossref_primary_10_1007_s11042_025_21041_4
crossref_primary_10_1093_comjnl_bxae053
crossref_primary_10_1016_j_bprint_2023_e00321
crossref_primary_10_1002_cpe_7889
crossref_primary_10_1007_s10462_025_11320_9
crossref_primary_10_1155_2023_9210803
crossref_primary_10_3390_s23052760
crossref_primary_10_1186_s13677_024_00676_y
crossref_primary_10_3390_s22239548
crossref_primary_10_1007_s11235_024_01166_x
crossref_primary_10_1049_2024_1056705
crossref_primary_10_1002_ett_70020
crossref_primary_10_1007_s42979_025_04244_2
crossref_primary_10_3390_en15124316
crossref_primary_10_1109_ACCESS_2022_3231622
crossref_primary_10_1109_TCSS_2022_3177359
crossref_primary_10_1109_ACCESS_2025_3582705
crossref_primary_10_1109_ACCESS_2025_3580569
crossref_primary_10_1155_int_2969737
crossref_primary_10_1007_s11277_024_11311_z
crossref_primary_10_1109_MIC_2022_3226757
Cites_doi 10.1504/IJGUC.2021.112475
10.1186/s13677-017-0098-8
10.26438/ijcse/v7i4.11311136
10.1016/j.jnca.2017.06.001
10.1109/TPDS.2015.2398438
10.1016/j.procs.2016.05.156
10.1007/s10845-012-0661-6
10.1016/j.future.2017.08.016
10.5815/ijitcs.2017.06.07
10.1007/s42979-020-00353-2
10.1109/MSP.2010.115
10.1109/MCC.2018.053711671
10.1016/j.cose.2011.10.006
10.1016/j.future.2017.02.022
10.17485/ijst/2019/v12i3/139557
10.1007/s41870-018-0108-1
10.1145/2775111
10.1016/j.dss.2018.12.005
10.1007/s12045-014-0030-1
10.1007/s11227-020-03213-1
10.5626/JCSE.2015.9.3.119
10.1016/j.procs.2015.04.245
10.1016/j.future.2010.12.006
10.1007/s00607-010-0140-x
10.1007/s10207-013-0208-7
10.1016/j.jnca.2016.05.010
10.1007/s11227-012-0831-5
10.1016/j.compeleceng.2016.03.004
10.1016/j.jnca.2016.11.027
10.1016/j.jnca.2016.09.002
10.1109/MCOM.2018.1700621
10.1109/TCC.2015.2415794
10.1016/j.ins.2015.01.025
10.1016/j.future.2016.10.008
10.1016/j.comnet.2019.01.013
10.1145/2767181
10.1016/j.jnca.2013.10.004
10.1016/j.proeng.2017.01.087
10.1016/j.jnca.2010.07.006
10.1016/j.cosrev.2019.05.002
10.1186/1869-0238-4-5
10.26483/ijarcs.v9i2.5760
10.1016/j.procs.2015.04.192
ContentType Journal Article
Copyright 2021 Elsevier Ltd
Copyright Elsevier Sequoia S.A. Mar 2022
Copyright_xml – notice: 2021 Elsevier Ltd
– notice: Copyright Elsevier Sequoia S.A. Mar 2022
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/j.cose.2021.102580
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Criminal Justice (Alumni)

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Business
EISSN 1872-6208
ExternalDocumentID 10_1016_j_cose_2021_102580
S0167404821003977
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c328t-27e046a40d2d41dca6ae5fa68d68b24b769e067ba4b6e1340b148a549e87a15c3
ISICitedReferencesCount 87
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000754417100006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-4048
IngestDate Thu Nov 20 01:16:03 EST 2025
Tue Nov 18 22:17:18 EST 2025
Sat Nov 29 07:26:05 EST 2025
Fri Feb 23 02:40:24 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords IaaS
Cloud computing
Service-based cloud computing
Security
PaaS
SaaS
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c328t-27e046a40d2d41dca6ae5fa68d68b24b769e067ba4b6e1340b148a549e87a15c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2639038928
PQPubID 46289
ParticipantIDs proquest_journals_2639038928
crossref_primary_10_1016_j_cose_2021_102580
crossref_citationtrail_10_1016_j_cose_2021_102580
elsevier_sciencedirect_doi_10_1016_j_cose_2021_102580
PublicationCentury 2000
PublicationDate March 2022
2022-03-00
20220301
PublicationDateYYYYMMDD 2022-03-01
PublicationDate_xml – month: 03
  year: 2022
  text: March 2022
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 2022
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References Machado, Hausheer, Stiller (bib0053) 2009
Khan, Al-Yasiri (bib0044) 2016
Bouayad, Blilat, Mejhed, Ghazi (bib0016) 2012
Huang, Ganjali, Kim, Oh, Lie (bib0035) 2015; 47
Bach-Nutman (bib0009) 2020
Selvamani, Jayanthi (bib0067) 2015; 48
Ali, Khan, Vasilakos (bib0002) 2015; 305
Almorsy, Grundy, Müller (bib0003) 2016
Verma, Kaushal (bib0080) 2011
Coppolino, D’Antonio, Mazzeo, Romano (bib0021) 2017; 59
e Rubab, Azhar, Anwar, Majeed (bib0065) 2020; 2
Halboob, Abbas, Haouam, Yaseen (bib0032) 2014
Rodero-Merino, Vaquero, Caron, Muresan, Desprez (bib0064) 2012; 31
Loukis, Janssen, Mintchev (bib0052) 2019; 117
Vasiljeva, Shaikhulina, Kreslins (bib0079) 2017; 178
Zissis, Lekkas (bib0086) 2012; 28
Barrowclough, Asif (bib0011) 2018; 2018
Krishna, Kiran, Murali, Reddy (bib0046) 2016; 87
Ghobaei-Arani, Jabbehdari, Pourmina (bib0028) 2018; 78
Singh, Chatterjee (bib0071) 2017; 79
Freet, Agrawal, John, Walker (bib0026) 2015
Li (bib0049) 2020
Agarwal, Kaushal, Chouhan (bib0001) 2020
Asvija, Eswari, Bijoy (bib0008) 2019; 151
Grobauer, Walloschek, Stöcker (bib0030) 2011; 9
Singh, Jeong, Park (bib0073) 2016; 75
Fernandes, Soares, Gomes, Freire, Inácio (bib0024) 2014; 13
Hwang, Bai, Shi, Li, Chen, Wu (bib0036) 2016; 27
George Amalarethinam, Rajakumari (bib0027) 2019
Cook (bib0020) 2018
Kritikos, Kirkham, Kryza, Massonet (bib0047) 2017; 67
Rajaraman (bib0061) 2014; 19
Kaur, Raj, Yadav, Choudhury (bib0041) 2018
Li, Zhou, Shi, Guo (bib0050) 2010
Modi, Patel, Borisaniya, Patel, Rajarajan (bib0057) 2013; 63
Yan, Huang, Luo, Gong, Yu (bib0084) 2018; 56
Almutairy (bib0004) 2019
Bauman, Ayoade, Lin (bib0013) 2015; 48
Flexera (bib0025) 2020
Hay, Nance, Bishop (bib0034) 2011
Gonzales, Kaplan, Saltzman, Winkelman, Woods (bib0029) 2017; 5
Anwar, Inayat, Zolkipli, Zain, Gani, Anuar, Khan, Chang (bib0006) 2017; 93
Shaikh, Meshram (bib0069) 2020
Cabuk, Dalton, Edwards, Fischer (bib0017) 2008
Rashid, Chaturvedi (bib0063) 2019; 7
Vaquero, Rodero-Merino, Morán (bib0077) 2011; 91
Varghese, Buyya (bib0078) 2017
Sandikkaya, Harmanci (bib0066) 2012
Zhang, Zhang, Ou (bib0085) 2014
Toraskar, Borse (bib0076) 2018; 975
Guerbouj, Gharsellaoui, Bouamama (bib0031) 2019; 10
Panda, Behera, Jena (bib0059) 2021
Basu, Bardhan, Gupta, Saha, Pal, Bose, Basu, Chaudhury, Sarkar (bib0012) 2018
Kim, Vouk (bib0045) 2014
Sengupta, Kaulgud, Sharma (bib0068) 2011
Chouhan, Yao, Sezer (bib0019) 2015
Liu, Sun, Ryoo, Rizvi, Vasilakos (bib0051) 2015; 9
Arora, Wadhawan, Ahuja (bib0007) 2012; 2
Subashini, Kavitha (bib0074) 2011; 34
Shyam, Theja (bib0070) 2021; 12
IBM Cloud Education, 2021. IaaS vs PaaS vs SaaS, understand and compare the three most popular cloud computing service models.
McKay, Cooper (bib0056) 2018
Tabrizchi, Rafsanjani (bib0075) 2020; 76
Bohn, Messina, Liu, Tong, Mao (bib0015) 2011
Kamongi, Kotikela, Kavi, Gomathisankaran, Singhal (bib0040) 2013
Bahrami, Singhal (bib0010) 2015
Deshmukh, Devadkar (bib0022) 2015; 49
Diaby, Rad (bib0023) 2017; 9
Weinman (bib0083) 2018; 5
Manvi, Shyam (bib0055) 2014; 41
Pancholi, Patel (bib0058) 2016; 2
Khan (bib0043) 2016; 71
Wang, Liu, Sun, Zou, Yang (bib0082) 2014; 25
Hashizume, Rosado, Fernández-Medina, Fernández (bib0033) 2013; 4
Chawki, Ahmed, Zakariae (bib0018) 2018
Malik, Wani, Rashid (bib0054) 2018; 9
Verma, Adhikari (bib0081) 2020; 1
Singh (bib0072) 2019; 11
Amato, Moscato, Moscato, Colace (bib0005) 2018; 87
Khalaf, Mostafa, Mustapha, Ismaila, Mahmoud, Jubaira, Hassan (bib0042) 2019; 26
Becker, Brataas, Cecowski, Huljenic, Lehrig, Stupar (bib0014) 2017
Pham, Liu, Zheng, Fu, Deshpande, Xia, Zhou, Abdelrazek (bib0060) 2017
Rakotondravony, Taubmann, Mandarawi, Weishäupl, Xu, Kolosnjaji, Protsenko, de Meer, Reiser (bib0062) 2017; 6
Isharufe, Jaafar, Butakov (bib0038) 2020
Jabir, Khanji, Ahmad, Alfandi, Said (bib0039) 2016
Kumar, Goyal (bib0048) 2019; 33
McKay (10.1016/j.cose.2021.102580_bib0056) 2018
Sengupta (10.1016/j.cose.2021.102580_bib0068) 2011
e Rubab (10.1016/j.cose.2021.102580_bib0065) 2020; 2
Vaquero (10.1016/j.cose.2021.102580_bib0077) 2011; 91
Cook (10.1016/j.cose.2021.102580_bib0020) 2018
Freet (10.1016/j.cose.2021.102580_bib0026) 2015
Zissis (10.1016/j.cose.2021.102580_bib0086) 2012; 28
Arora (10.1016/j.cose.2021.102580_bib0007) 2012; 2
Machado (10.1016/j.cose.2021.102580_bib0053) 2009
Verma (10.1016/j.cose.2021.102580_bib0081) 2020; 1
Bohn (10.1016/j.cose.2021.102580_bib0015) 2011
Basu (10.1016/j.cose.2021.102580_bib0012) 2018
Varghese (10.1016/j.cose.2021.102580_sbref0078) 2017
Kritikos (10.1016/j.cose.2021.102580_bib0047) 2017; 67
Almutairy (10.1016/j.cose.2021.102580_bib0004) 2019
Amato (10.1016/j.cose.2021.102580_bib0005) 2018; 87
Modi (10.1016/j.cose.2021.102580_bib0057) 2013; 63
Pham (10.1016/j.cose.2021.102580_bib0060) 2017
Becker (10.1016/j.cose.2021.102580_bib0014) 2017
Kaur (10.1016/j.cose.2021.102580_bib0041) 2018
10.1016/j.cose.2021.102580_bib0037
Isharufe (10.1016/j.cose.2021.102580_bib0038) 2020
Tabrizchi (10.1016/j.cose.2021.102580_bib0075) 2020; 76
Kumar (10.1016/j.cose.2021.102580_bib0048) 2019; 33
Anwar (10.1016/j.cose.2021.102580_bib0006) 2017; 93
Malik (10.1016/j.cose.2021.102580_bib0054) 2018; 9
Singh (10.1016/j.cose.2021.102580_bib0073) 2016; 75
Ali (10.1016/j.cose.2021.102580_bib0002) 2015; 305
Zhang (10.1016/j.cose.2021.102580_bib0085) 2014
Hay (10.1016/j.cose.2021.102580_bib0034) 2011
Selvamani (10.1016/j.cose.2021.102580_bib0067) 2015; 48
George Amalarethinam (10.1016/j.cose.2021.102580_bib0027) 2019
Toraskar (10.1016/j.cose.2021.102580_bib0076) 2018; 975
Rajaraman (10.1016/j.cose.2021.102580_bib0061) 2014; 19
Bauman (10.1016/j.cose.2021.102580_bib0013) 2015; 48
Bach-Nutman (10.1016/j.cose.2021.102580_sbref0009) 2020
Deshmukh (10.1016/j.cose.2021.102580_bib0022) 2015; 49
Rashid (10.1016/j.cose.2021.102580_bib0063) 2019; 7
Barrowclough (10.1016/j.cose.2021.102580_bib0011) 2018; 2018
Vasiljeva (10.1016/j.cose.2021.102580_bib0079) 2017; 178
Bouayad (10.1016/j.cose.2021.102580_bib0016) 2012
Khalaf (10.1016/j.cose.2021.102580_bib0042) 2019; 26
Gonzales (10.1016/j.cose.2021.102580_bib0029) 2017; 5
Grobauer (10.1016/j.cose.2021.102580_bib0030) 2011; 9
Weinman (10.1016/j.cose.2021.102580_bib0083) 2018; 5
Ghobaei-Arani (10.1016/j.cose.2021.102580_bib0028) 2018; 78
Khan (10.1016/j.cose.2021.102580_bib0043) 2016; 71
Chawki (10.1016/j.cose.2021.102580_bib0018) 2018
Panda (10.1016/j.cose.2021.102580_bib0059) 2021
Agarwal (10.1016/j.cose.2021.102580_bib0001) 2020
Krishna (10.1016/j.cose.2021.102580_bib0046) 2016; 87
Khan (10.1016/j.cose.2021.102580_bib0044) 2016
Hwang (10.1016/j.cose.2021.102580_bib0036) 2016; 27
Manvi (10.1016/j.cose.2021.102580_bib0055) 2014; 41
Asvija (10.1016/j.cose.2021.102580_bib0008) 2019; 151
Cabuk (10.1016/j.cose.2021.102580_bib0017) 2008
Subashini (10.1016/j.cose.2021.102580_bib0074) 2011; 34
Verma (10.1016/j.cose.2021.102580_bib0080) 2011
Shaikh (10.1016/j.cose.2021.102580_bib0069) 2020
Flexera (10.1016/j.cose.2021.102580_bib0025) 2020
Coppolino (10.1016/j.cose.2021.102580_bib0021) 2017; 59
Loukis (10.1016/j.cose.2021.102580_bib0052) 2019; 117
Hashizume (10.1016/j.cose.2021.102580_bib0033) 2013; 4
Huang (10.1016/j.cose.2021.102580_bib0035) 2015; 47
Liu (10.1016/j.cose.2021.102580_bib0051) 2015; 9
Kim (10.1016/j.cose.2021.102580_bib0045) 2014
Li (10.1016/j.cose.2021.102580_bib0050) 2010
Chouhan (10.1016/j.cose.2021.102580_bib0019) 2015
Kamongi (10.1016/j.cose.2021.102580_bib0040) 2013
Rodero-Merino (10.1016/j.cose.2021.102580_bib0064) 2012; 31
Guerbouj (10.1016/j.cose.2021.102580_bib0031) 2019; 10
Yan (10.1016/j.cose.2021.102580_bib0084) 2018; 56
Wang (10.1016/j.cose.2021.102580_bib0082) 2014; 25
Halboob (10.1016/j.cose.2021.102580_bib0032) 2014
Singh (10.1016/j.cose.2021.102580_bib0071) 2017; 79
Singh (10.1016/j.cose.2021.102580_bib0072) 2019; 11
Almorsy (10.1016/j.cose.2021.102580_sbref0003) 2016
Rakotondravony (10.1016/j.cose.2021.102580_bib0062) 2017; 6
Fernandes (10.1016/j.cose.2021.102580_bib0024) 2014; 13
Jabir (10.1016/j.cose.2021.102580_bib0039) 2016
Shyam (10.1016/j.cose.2021.102580_bib0070) 2021; 12
Li (10.1016/j.cose.2021.102580_sbref0049) 2020
Pancholi (10.1016/j.cose.2021.102580_bib0058) 2016; 2
Bahrami (10.1016/j.cose.2021.102580_bib0010) 2015
Diaby (10.1016/j.cose.2021.102580_bib0023) 2017; 9
Sandikkaya (10.1016/j.cose.2021.102580_bib0066) 2012
References_xml – volume: 63
  start-page: 561
  year: 2013
  end-page: 592
  ident: bib0057
  article-title: A survey on security issues and solutions at different layers of cloud computing
  publication-title: J. Supercomput.
– year: 2020
  ident: bib0049
  article-title: Vulnerabilities Mapping Based on OWASP-SANS: a Survey for Static Application Security Testing (SAST)
– start-page: 285
  year: 2017
  end-page: 287
  ident: bib0060
  article-title: Paas - black or white: an investigation into software development model for building retail industry saas
  publication-title: Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20–28, 2017 - Companion Volume
– volume: 67
  start-page: 206
  year: 2017
  end-page: 226
  ident: bib0047
  article-title: Towards a security-enhanced paas platform for multi-cloud applications
  publication-title: Future Gener. Comput. Syst.
– start-page: 158
  year: 2015
  end-page: 165
  ident: bib0010
  article-title: DCCSOA: A dynamic cloud computing service-oriented architecture
  publication-title: 2015 IEEE International Conference on Information Reuse and Integration, IRI 2015, San Francisco, CA, USA, August 13–15, 2015
– start-page: 148
  year: 2015
  end-page: 155
  ident: bib0026
  article-title: Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS
  publication-title: Proceedings of the 7th International Conference on Management of Computational and Collective Intelligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25, - 29, 2015
– start-page: 1
  year: 2011
  end-page: 7
  ident: bib0034
  article-title: Storm clouds rising: Security challenges for iaas cloud computing
  publication-title: 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), Proceedings, 4–7 January 2011, Koloa, Kauai, HI, USA
– volume: 33
  start-page: 1
  year: 2019
  end-page: 48
  ident: bib0048
  article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey
  publication-title: Comput. Sci. Rev.
– volume: 117
  start-page: 38
  year: 2019
  end-page: 47
  ident: bib0052
  article-title: Determinants of software-as-a-service benefits and impact on firm performance
  publication-title: Decis. Support Syst.
– volume: 75
  start-page: 200
  year: 2016
  end-page: 222
  ident: bib0073
  article-title: A survey on cloud computing security: issues, threats, and solutions
  publication-title: J. Netw. Comput. Appl.
– start-page: 119
  year: 2020
  end-page: 134
  ident: bib0001
  article-title: A survey on cloud computing security issues and cryptographic techniques
  publication-title: Social Networking and Computational Intelligence
– volume: 91
  start-page: 93
  year: 2011
  end-page: 118
  ident: bib0077
  article-title: Locking the sky: a survey on iaas cloud security
  publication-title: Computing
– start-page: 59
  year: 2014
  end-page: 63
  ident: bib0045
  article-title: A survey of common security vulnerabilities and corresponding countermeasures for saas
  publication-title: 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8–12, 2014
– volume: 76
  start-page: 9493
  year: 2020
  end-page: 9532
  ident: bib0075
  article-title: A survey on security challenges in cloud computing: issues, threats, and solutions
  publication-title: J. Supercomput.
– start-page: 485
  year: 2016
  end-page: 490
  ident: bib0044
  article-title: Identifying cloud security threats to strengthen cloud computing adoption framework
  publication-title: The 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, August 15–18, 2016, Montreal, Quebec, Canada
– start-page: 328
  year: 2018
  end-page: 333
  ident: bib0018
  article-title: Iaas cloud model security issues on behalf cloud provider and user security behaviors
  publication-title: The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, Gran Canaria, Spain, August 13–15, 2018
– volume: 25
  start-page: 283
  year: 2014
  end-page: 291
  ident: bib0082
  article-title: Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing
  publication-title: J. Intell. Manuf.
– volume: 5
  start-page: 101
  year: 2018
  ident: bib0083
  article-title: The economics of pay-per-use pricing
  publication-title: IEEE Cloud Comput.
– volume: 19
  start-page: 242
  year: 2014
  end-page: 258
  ident: bib0061
  article-title: Cloud computing
  publication-title: Resonance
– start-page: 2843
  year: 2010
  end-page: 2848
  ident: bib0050
  article-title: A trusted computing environment model in cloud architecture
  publication-title: International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11–14, 2010, Proceedings
– reference: IBM Cloud Education, 2021. IaaS vs PaaS vs SaaS, understand and compare the three most popular cloud computing service models.
– start-page: 218
  year: 2013
  end-page: 226
  ident: bib0040
  article-title: VULCAN: vulnerability assessment framework for cloud computing
  publication-title: IEEE 7th International Conference on Software Security and Reliability, SERE 2013, Gaithersburg, MD, USA, June 18–20, 2013
– volume: 41
  start-page: 424
  year: 2014
  end-page: 440
  ident: bib0055
  article-title: Resource management for infrastructure as a service (iaas) in cloud computing: a survey
  publication-title: J. Netw. Comput. Appl.
– volume: 4
  start-page: 5:1
  year: 2013
  end-page: 5:13
  ident: bib0033
  article-title: An analysis of security issues for cloud computing
  publication-title: J. Internet Serv. Appl.
– volume: 9
  year: 2018
  ident: bib0054
  article-title: Cloud computing-technologies
  publication-title: International Journal of Advanced Research in Computer Science
– year: 2020
  ident: bib0009
  article-title: Understanding the Top 10 deldDel deliIns deltThinspace OWASP Vulnerabilities
– year: 2019
  ident: bib0027
  article-title: A Survey on Security Challenges in Cloud Computing
– start-page: 347
  year: 2018
  end-page: 356
  ident: bib0012
  article-title: Cloud computing security challenges & solutions-a survey
  publication-title: IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018, Las Vegas, NV, USA, January 8–10, 2018
– volume: 48
  start-page: 347
  year: 2015
  end-page: 352
  ident: bib0067
  article-title: A review on cloud data security and its mitigation techniques
  publication-title: Procedia Comput Sci
– volume: 71
  start-page: 11
  year: 2016
  end-page: 29
  ident: bib0043
  article-title: A survey of security issues for cloud computing
  publication-title: J. Netw. Comput. Appl.
– volume: 13
  start-page: 113
  year: 2014
  end-page: 170
  ident: bib0024
  article-title: Security issues in cloud environments: a survey
  publication-title: Int. J. Inf. Sec.
– volume: 2
  start-page: 29
  year: 2020
  end-page: 35
  ident: bib0065
  article-title: Security threats in cloud computing: trend and challenges
  publication-title: International Journal of Computing and Communication Networks
– start-page: 26
  year: 2012
  end-page: 31
  ident: bib0016
  article-title: Cloud computing: Security challenges
  publication-title: 2012 Colloquium in Information Science and Technology, CIST 2012, Fez, Morocco, October 22–24, 2012
– year: 2018
  ident: bib0056
  article-title: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations (2nd Draft)
  publication-title: Technical Report
– volume: 79
  start-page: 88
  year: 2017
  end-page: 115
  ident: bib0071
  article-title: Cloud security issues and challenges: a survey
  publication-title: J. Netw. Comput. Appl.
– volume: 31
  start-page: 96
  year: 2012
  end-page: 108
  ident: bib0064
  article-title: Building safe paas clouds: a survey on security in multitenant software platforms
  publication-title: Comput. Secur.
– volume: 34
  start-page: 1
  year: 2011
  end-page: 11
  ident: bib0074
  article-title: A survey on security issues in service delivery models of cloud computing
  publication-title: J. Netw. Comput. Appl.
– volume: 59
  start-page: 126
  year: 2017
  end-page: 140
  ident: bib0021
  article-title: Cloud security: emerging threats and current solutions
  publication-title: Comput. Electr. Eng.
– volume: 151
  start-page: 68
  year: 2019
  end-page: 92
  ident: bib0008
  article-title: Security in hardware assisted virtualization for cloud computing - state of the art issues and challenges
  publication-title: Comput. Networks
– start-page: 3
  year: 2017
  end-page: 21
  ident: bib0014
  article-title: Introduction
  publication-title: Engineering Scalable, Elastic, and Cost-Efficient Cloud Computing Applications - The CloudScale Method
– volume: 9
  start-page: 50
  year: 2017
  end-page: 58
  ident: bib0023
  article-title: Cloud computing: a review of the concepts and deployment models
  publication-title: International Journal of Information Technology and Computer Science
– volume: 87
  start-page: 246
  year: 2016
  end-page: 251
  ident: bib0046
  article-title: Security issues in service model of cloud computing environment
  publication-title: Procedia Comput Sci
– volume: 87
  start-page: 754
  year: 2018
  end-page: 764
  ident: bib0005
  article-title: Improving security in cloud by formal modeling of iaas resources
  publication-title: Future Generation Computer Systems
– volume: 93
  start-page: 259
  year: 2017
  end-page: 279
  ident: bib0006
  article-title: Cross-vm cache-based side channel attacks and proposed prevention mechanisms: a survey
  publication-title: J. Netw. Comput. Appl.
– volume: 27
  start-page: 130
  year: 2016
  end-page: 143
  ident: bib0036
  article-title: Cloud performance modeling with benchmark evaluation of elastic scaling strategies
  publication-title: IEEE Trans. Parallel Distributed Syst.
– volume: 975
  start-page: 8887
  year: 2018
  ident: bib0076
  article-title: Implementation of cloud computing service delivery models (IaaS, PaaS) by aws and microsoft azure: a survey
  publication-title: Int J Comput Appl
– volume: 9
  year: 2015
  ident: bib0051
  article-title: A survey of security and privacy challenges in cloud computing: solutions and future directions
  publication-title: J. Comput. Sci. Eng.
– start-page: 513
  year: 2021
  end-page: 524
  ident: bib0059
  article-title: A survey on cloud computing security issues, attacks and countermeasures
  publication-title: Advances in Machine Learning and Computational Intelligence
– volume: 1
  start-page: 1
  year: 2020
  end-page: 8
  ident: bib0081
  article-title: Cloud computing security issues: a stakeholder’s perspective
  publication-title: SN Computer Science
– volume: 10
  start-page: 32
  year: 2019
  end-page: 44
  ident: bib0031
  article-title: A comprehensive survey on privacy and security issues in cloud computing, internet of things and cloud of things
  publication-title: Int. J. Serv. Sci. Manag. Eng. Technol.
– start-page: 63
  year: 2020
  end-page: 77
  ident: bib0069
  article-title: Security issues in cloud computing
  publication-title: Intelligent Computing and Networking
– year: 2020
  ident: bib0025
  article-title: Flexera 2020 state of the cloud report
  publication-title: Applied Computing and Informatics
– year: 2016
  ident: bib0003
  article-title: An Analysis of the Cloud Computing Security Problem
– volume: 2
  start-page: 18
  year: 2016
  end-page: 21
  ident: bib0058
  article-title: Enhancement of cloud computing security with secure data storage using aes
  publication-title: International Journal for Innovative Research in Science and Technology
– year: 2019
  ident: bib0004
  article-title: A taxonomy of virtualization security issues in cloud computing environments
  publication-title: Indian Journal of Science and Technology
– volume: 7
  start-page: 1131
  year: 2019
  end-page: 1136
  ident: bib0063
  article-title: Virtualization and its role in cloud computing environment
  publication-title: International Journal of Computer Sciences and Engineering
– volume: 11
  start-page: 683
  year: 2019
  end-page: 690
  ident: bib0072
  article-title: Security concerns and countermeasures in cloud computing: a qualitative analysis
  publication-title: International Journal of Information Technology
– volume: 78
  start-page: 191
  year: 2018
  end-page: 210
  ident: bib0028
  article-title: An autonomic resource provisioning approach for service-based cloud applications: a hybrid approach
  publication-title: Future Gener. Comput. Syst.
– start-page: 1
  year: 2020
  end-page: 6
  ident: bib0038
  article-title: Study of security issues in platform-as-a-service (PAAS) cloud model
  publication-title: 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)
– volume: 28
  start-page: 583
  year: 2012
  end-page: 592
  ident: bib0086
  article-title: Addressing cloud computing security issues
  publication-title: Future Gener. Comput. Syst.
– start-page: 38
  year: 2018
  end-page: 47
  ident: bib0020
  article-title: Formal reasoning about the security of amazon web services
  publication-title: Computer Aided Verification - 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14–17, 2018, Proceedings, Part I
– start-page: 516
  year: 2018
  end-page: 520
  ident: bib0041
  article-title: Performance evaluation of aws and ibm cloud platforms for security mechanism
  publication-title: 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS)
– year: 2017
  ident: bib0078
  article-title: Next Generation Cloud Computing: New Trends and Research Directions
– volume: 2018
  start-page: 1681908:1
  year: 2018
  end-page: 1681908:20
  ident: bib0011
  article-title: Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures
  publication-title: Secur. Commun. Networks
– year: 2009
  ident: bib0053
  article-title: Considerations on the interoperability of and between cloud computing standards
  publication-title: 27th open Grid Forum (OGF27), G2C-Net Workshop: From Grid to Cloud Networks
– volume: 49
  start-page: 202
  year: 2015
  end-page: 210
  ident: bib0022
  article-title: Understanding ddos attack & its effect in cloud environment
  publication-title: Procedia Comput Sci
– volume: 26
  start-page: 188
  year: 2019
  end-page: 197
  ident: bib0042
  article-title: A simulation study of syn flood attack in cloud computing environment
  publication-title: AUS journal
– volume: 48
  start-page: 10:1
  year: 2015
  end-page: 10:33
  ident: bib0013
  article-title: A survey on hypervisor-based monitoring: approaches, applications, and evolutions
  publication-title: ACM Comput. Surv.
– start-page: 162
  year: 2015
  end-page: 170
  ident: bib0019
  article-title: Software as a service: Understanding security issues
  publication-title: 2015 Science and Information Conference (SAI)
– volume: 5
  start-page: 523
  year: 2017
  end-page: 536
  ident: bib0029
  article-title: Cloud-trust - a security assessment model for infrastructure as a service (iaas) clouds
  publication-title: IEEE Trans. Cloud Comput.
– volume: 6
  start-page: 26
  year: 2017
  ident: bib0062
  article-title: Classifying malware attacks in iaas cloud environments
  publication-title: J. Cloud Comput.
– start-page: 317
  year: 2014
  end-page: 328
  ident: bib0085
  article-title: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud
  publication-title: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan - June 03 - 06, 2014
– volume: 2
  year: 2012
  ident: bib0007
  article-title: Cloud computing security issues in infrastructure as a service
  publication-title: International journal of advanced research in computer science and software engineering
– start-page: 594
  year: 2011
  end-page: 596
  ident: bib0015
  article-title: NIST cloud computing reference architecture
  publication-title: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4–9, 2011
– year: 2008
  ident: bib0017
  article-title: A comparative study on secure network virtualization
  publication-title: HP Laboratories
– volume: 178
  start-page: 443
  year: 2017
  end-page: 451
  ident: bib0079
  article-title: Cloud computing: business perspectives, benefits and challenges for small and medium enterprises (case of latvia)
  publication-title: Procedia Eng
– volume: 12
  start-page: 1
  year: 2021
  end-page: 14
  ident: bib0070
  article-title: A survey on resolving security issues in saas through software defined networks
  publication-title: Int. J. Grid Util. Comput.
– start-page: 117
  year: 2016
  end-page: 123
  ident: bib0039
  article-title: Analysis of cloud computing attacks and countermeasures
  publication-title: 2016 18th International Conference on Advanced Communication Technology (ICACT)
– volume: 305
  start-page: 357
  year: 2015
  end-page: 383
  ident: bib0002
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
– start-page: 524
  year: 2011
  end-page: 531
  ident: bib0068
  article-title: Cloud computing security-trends and research directions
  publication-title: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4–9, 2011
– start-page: 434
  year: 2014
  end-page: 443
  ident: bib0032
  article-title: Dynamically changing service level agreements (slas) management in cloud computing
  publication-title: Intelligent Computing Methodologies - 10th International Conference, ICIC 2014, Taiyuan, China, August 3–6, 2014. Proceedings
– volume: 47
  start-page: 68:1
  year: 2015
  end-page: 68:31
  ident: bib0035
  article-title: The state of public infrastructure-as-a-service cloud security
  publication-title: ACM Comput. Surv.
– start-page: 445
  year: 2011
  end-page: 454
  ident: bib0080
  article-title: Cloud computing security issues and challenges: A survey
  publication-title: Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22–24, 2011, Proceedings, Part IV
– volume: 56
  start-page: 30
  year: 2018
  end-page: 36
  ident: bib0084
  article-title: A multi-level ddos mitigation framework for the industrial internet of things
  publication-title: IEEE Commun. Mag.
– volume: 9
  start-page: 50
  year: 2011
  end-page: 57
  ident: bib0030
  article-title: Understanding cloud computing vulnerabilities
  publication-title: IEEE Secur. Priv.
– start-page: 463
  year: 2012
  end-page: 468
  ident: bib0066
  article-title: Security problems of platform-as-a-service (PaaS) clouds and practical solutions to the problems
  publication-title: IEEE 31st Symposium on Reliable Distributed Systems, SRDS 2012, Irvine, CA, USA, October 8–11, 2012
– start-page: 158
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0010
  article-title: DCCSOA: A dynamic cloud computing service-oriented architecture
– start-page: 119
  year: 2020
  ident: 10.1016/j.cose.2021.102580_bib0001
  article-title: A survey on cloud computing security issues and cryptographic techniques
– volume: 26
  start-page: 188
  issue: 1
  year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0042
  article-title: A simulation study of syn flood attack in cloud computing environment
  publication-title: AUS journal
– volume: 12
  start-page: 1
  issue: 1
  year: 2021
  ident: 10.1016/j.cose.2021.102580_bib0070
  article-title: A survey on resolving security issues in saas through software defined networks
  publication-title: Int. J. Grid Util. Comput.
  doi: 10.1504/IJGUC.2021.112475
– volume: 6
  start-page: 26
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0062
  article-title: Classifying malware attacks in iaas cloud environments
  publication-title: J. Cloud Comput.
  doi: 10.1186/s13677-017-0098-8
– volume: 7
  start-page: 1131
  issue: 4
  year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0063
  article-title: Virtualization and its role in cloud computing environment
  publication-title: International Journal of Computer Sciences and Engineering
  doi: 10.26438/ijcse/v7i4.11311136
– volume: 93
  start-page: 259
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0006
  article-title: Cross-vm cache-based side channel attacks and proposed prevention mechanisms: a survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2017.06.001
– start-page: 1
  year: 2020
  ident: 10.1016/j.cose.2021.102580_bib0038
  article-title: Study of security issues in platform-as-a-service (PAAS) cloud model
– volume: 27
  start-page: 130
  issue: 1
  year: 2016
  ident: 10.1016/j.cose.2021.102580_bib0036
  article-title: Cloud performance modeling with benchmark evaluation of elastic scaling strategies
  publication-title: IEEE Trans. Parallel Distributed Syst.
  doi: 10.1109/TPDS.2015.2398438
– volume: 87
  start-page: 246
  year: 2016
  ident: 10.1016/j.cose.2021.102580_bib0046
  article-title: Security issues in service model of cloud computing environment
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2016.05.156
– volume: 25
  start-page: 283
  issue: 2
  year: 2014
  ident: 10.1016/j.cose.2021.102580_bib0082
  article-title: Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing
  publication-title: J. Intell. Manuf.
  doi: 10.1007/s10845-012-0661-6
– year: 2020
  ident: 10.1016/j.cose.2021.102580_sbref0009
– volume: 87
  start-page: 754
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0005
  article-title: Improving security in cloud by formal modeling of iaas resources
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2017.08.016
– year: 2009
  ident: 10.1016/j.cose.2021.102580_bib0053
  article-title: Considerations on the interoperability of and between cloud computing standards
– volume: 9
  start-page: 50
  issue: 6
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0023
  article-title: Cloud computing: a review of the concepts and deployment models
  publication-title: International Journal of Information Technology and Computer Science
  doi: 10.5815/ijitcs.2017.06.07
– start-page: 328
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0018
  article-title: Iaas cloud model security issues on behalf cloud provider and user security behaviors
– start-page: 445
  year: 2011
  ident: 10.1016/j.cose.2021.102580_bib0080
  article-title: Cloud computing security issues and challenges: A survey
– volume: 2
  start-page: 18
  issue: 9
  year: 2016
  ident: 10.1016/j.cose.2021.102580_bib0058
  article-title: Enhancement of cloud computing security with secure data storage using aes
  publication-title: International Journal for Innovative Research in Science and Technology
– start-page: 317
  year: 2014
  ident: 10.1016/j.cose.2021.102580_bib0085
  article-title: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud
– start-page: 38
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0020
  article-title: Formal reasoning about the security of amazon web services
– start-page: 1
  year: 2011
  ident: 10.1016/j.cose.2021.102580_bib0034
  article-title: Storm clouds rising: Security challenges for iaas cloud computing
– volume: 1
  start-page: 1
  issue: 6
  year: 2020
  ident: 10.1016/j.cose.2021.102580_bib0081
  article-title: Cloud computing security issues: a stakeholder’s perspective
  publication-title: SN Computer Science
  doi: 10.1007/s42979-020-00353-2
– start-page: 162
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0019
  article-title: Software as a service: Understanding security issues
– start-page: 485
  year: 2016
  ident: 10.1016/j.cose.2021.102580_bib0044
  article-title: Identifying cloud security threats to strengthen cloud computing adoption framework
– start-page: 26
  year: 2012
  ident: 10.1016/j.cose.2021.102580_bib0016
  article-title: Cloud computing: Security challenges
– volume: 9
  start-page: 50
  issue: 2
  year: 2011
  ident: 10.1016/j.cose.2021.102580_bib0030
  article-title: Understanding cloud computing vulnerabilities
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSP.2010.115
– year: 2008
  ident: 10.1016/j.cose.2021.102580_bib0017
  article-title: A comparative study on secure network virtualization
  publication-title: HP Laboratories
– volume: 5
  start-page: 101
  issue: 5
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0083
  article-title: The economics of pay-per-use pricing
  publication-title: IEEE Cloud Comput.
  doi: 10.1109/MCC.2018.053711671
– volume: 31
  start-page: 96
  issue: 1
  year: 2012
  ident: 10.1016/j.cose.2021.102580_bib0064
  article-title: Building safe paas clouds: a survey on security in multitenant software platforms
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2011.10.006
– start-page: 463
  year: 2012
  ident: 10.1016/j.cose.2021.102580_bib0066
  article-title: Security problems of platform-as-a-service (PaaS) clouds and practical solutions to the problems
– volume: 78
  start-page: 191
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0028
  article-title: An autonomic resource provisioning approach for service-based cloud applications: a hybrid approach
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.02.022
– year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0004
  article-title: A taxonomy of virtualization security issues in cloud computing environments
  publication-title: Indian Journal of Science and Technology
  doi: 10.17485/ijst/2019/v12i3/139557
– start-page: 218
  year: 2013
  ident: 10.1016/j.cose.2021.102580_bib0040
  article-title: VULCAN: vulnerability assessment framework for cloud computing
– volume: 11
  start-page: 683
  issue: 4
  year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0072
  article-title: Security concerns and countermeasures in cloud computing: a qualitative analysis
  publication-title: International Journal of Information Technology
  doi: 10.1007/s41870-018-0108-1
– start-page: 148
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0026
  article-title: Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS
– start-page: 3
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0014
  article-title: Introduction
– start-page: 59
  year: 2014
  ident: 10.1016/j.cose.2021.102580_bib0045
  article-title: A survey of common security vulnerabilities and corresponding countermeasures for saas
– volume: 48
  start-page: 10:1
  issue: 1
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0013
  article-title: A survey on hypervisor-based monitoring: approaches, applications, and evolutions
  publication-title: ACM Comput. Surv.
  doi: 10.1145/2775111
– year: 2020
  ident: 10.1016/j.cose.2021.102580_bib0025
  article-title: Flexera 2020 state of the cloud report
  publication-title: Applied Computing and Informatics
– volume: 117
  start-page: 38
  year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0052
  article-title: Determinants of software-as-a-service benefits and impact on firm performance
  publication-title: Decis. Support Syst.
  doi: 10.1016/j.dss.2018.12.005
– volume: 19
  start-page: 242
  issue: 3
  year: 2014
  ident: 10.1016/j.cose.2021.102580_bib0061
  article-title: Cloud computing
  publication-title: Resonance
  doi: 10.1007/s12045-014-0030-1
– start-page: 63
  year: 2020
  ident: 10.1016/j.cose.2021.102580_bib0069
  article-title: Security issues in cloud computing
– volume: 76
  start-page: 9493
  issue: 12
  year: 2020
  ident: 10.1016/j.cose.2021.102580_bib0075
  article-title: A survey on security challenges in cloud computing: issues, threats, and solutions
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-020-03213-1
– volume: 9
  issue: 3
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0051
  article-title: A survey of security and privacy challenges in cloud computing: solutions and future directions
  publication-title: J. Comput. Sci. Eng.
  doi: 10.5626/JCSE.2015.9.3.119
– year: 2017
  ident: 10.1016/j.cose.2021.102580_sbref0078
– volume: 49
  start-page: 202
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0022
  article-title: Understanding ddos attack & its effect in cloud environment
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2015.04.245
– volume: 28
  start-page: 583
  issue: 3
  year: 2012
  ident: 10.1016/j.cose.2021.102580_bib0086
  article-title: Addressing cloud computing security issues
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2010.12.006
– start-page: 347
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0012
  article-title: Cloud computing security challenges & solutions-a survey
– ident: 10.1016/j.cose.2021.102580_bib0037
– volume: 2
  issue: 1
  year: 2012
  ident: 10.1016/j.cose.2021.102580_bib0007
  article-title: Cloud computing security issues in infrastructure as a service
  publication-title: International journal of advanced research in computer science and software engineering
– volume: 91
  start-page: 93
  issue: 1
  year: 2011
  ident: 10.1016/j.cose.2021.102580_bib0077
  article-title: Locking the sky: a survey on iaas cloud security
  publication-title: Computing
  doi: 10.1007/s00607-010-0140-x
– volume: 13
  start-page: 113
  issue: 2
  year: 2014
  ident: 10.1016/j.cose.2021.102580_bib0024
  article-title: Security issues in cloud environments: a survey
  publication-title: Int. J. Inf. Sec.
  doi: 10.1007/s10207-013-0208-7
– start-page: 524
  year: 2011
  ident: 10.1016/j.cose.2021.102580_bib0068
  article-title: Cloud computing security-trends and research directions
– volume: 71
  start-page: 11
  year: 2016
  ident: 10.1016/j.cose.2021.102580_bib0043
  article-title: A survey of security issues for cloud computing
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.05.010
– volume: 63
  start-page: 561
  issue: 2
  year: 2013
  ident: 10.1016/j.cose.2021.102580_bib0057
  article-title: A survey on security issues and solutions at different layers of cloud computing
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-012-0831-5
– volume: 59
  start-page: 126
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0021
  article-title: Cloud security: emerging threats and current solutions
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2016.03.004
– start-page: 2843
  year: 2010
  ident: 10.1016/j.cose.2021.102580_bib0050
  article-title: A trusted computing environment model in cloud architecture
– volume: 79
  start-page: 88
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0071
  article-title: Cloud security issues and challenges: a survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.11.027
– volume: 75
  start-page: 200
  year: 2016
  ident: 10.1016/j.cose.2021.102580_bib0073
  article-title: A survey on cloud computing security: issues, threats, and solutions
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.09.002
– start-page: 516
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0041
  article-title: Performance evaluation of aws and ibm cloud platforms for security mechanism
– volume: 56
  start-page: 30
  issue: 2
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0084
  article-title: A multi-level ddos mitigation framework for the industrial internet of things
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2018.1700621
– volume: 5
  start-page: 523
  issue: 3
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0029
  article-title: Cloud-trust - a security assessment model for infrastructure as a service (iaas) clouds
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2015.2415794
– start-page: 117
  year: 2016
  ident: 10.1016/j.cose.2021.102580_bib0039
  article-title: Analysis of cloud computing attacks and countermeasures
– volume: 305
  start-page: 357
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0002
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2015.01.025
– volume: 67
  start-page: 206
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0047
  article-title: Towards a security-enhanced paas platform for multi-cloud applications
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.10.008
– volume: 151
  start-page: 68
  year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0008
  article-title: Security in hardware assisted virtualization for cloud computing - state of the art issues and challenges
  publication-title: Comput. Networks
  doi: 10.1016/j.comnet.2019.01.013
– volume: 2
  start-page: 29
  issue: 1
  year: 2020
  ident: 10.1016/j.cose.2021.102580_bib0065
  article-title: Security threats in cloud computing: trend and challenges
  publication-title: International Journal of Computing and Communication Networks
– start-page: 285
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0060
  article-title: Paas - black or white: an investigation into software development model for building retail industry saas
– year: 2016
  ident: 10.1016/j.cose.2021.102580_sbref0003
– start-page: 434
  year: 2014
  ident: 10.1016/j.cose.2021.102580_bib0032
  article-title: Dynamically changing service level agreements (slas) management in cloud computing
– volume: 47
  start-page: 68:1
  issue: 4
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0035
  article-title: The state of public infrastructure-as-a-service cloud security
  publication-title: ACM Comput. Surv.
  doi: 10.1145/2767181
– volume: 975
  start-page: 8887
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0076
  article-title: Implementation of cloud computing service delivery models (IaaS, PaaS) by aws and microsoft azure: a survey
  publication-title: Int J Comput Appl
– volume: 2018
  start-page: 1681908:1
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0011
  article-title: Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures
  publication-title: Secur. Commun. Networks
– volume: 41
  start-page: 424
  year: 2014
  ident: 10.1016/j.cose.2021.102580_bib0055
  article-title: Resource management for infrastructure as a service (iaas) in cloud computing: a survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2013.10.004
– start-page: 594
  year: 2011
  ident: 10.1016/j.cose.2021.102580_bib0015
  article-title: NIST cloud computing reference architecture
– year: 2020
  ident: 10.1016/j.cose.2021.102580_sbref0049
– year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0027
– volume: 178
  start-page: 443
  year: 2017
  ident: 10.1016/j.cose.2021.102580_bib0079
  article-title: Cloud computing: business perspectives, benefits and challenges for small and medium enterprises (case of latvia)
  publication-title: Procedia Eng
  doi: 10.1016/j.proeng.2017.01.087
– volume: 34
  start-page: 1
  issue: 1
  year: 2011
  ident: 10.1016/j.cose.2021.102580_bib0074
  article-title: A survey on security issues in service delivery models of cloud computing
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2010.07.006
– volume: 10
  start-page: 32
  issue: 3
  year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0031
  article-title: A comprehensive survey on privacy and security issues in cloud computing, internet of things and cloud of things
  publication-title: Int. J. Serv. Sci. Manag. Eng. Technol.
– start-page: 513
  year: 2021
  ident: 10.1016/j.cose.2021.102580_bib0059
  article-title: A survey on cloud computing security issues, attacks and countermeasures
– volume: 33
  start-page: 1
  year: 2019
  ident: 10.1016/j.cose.2021.102580_bib0048
  article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2019.05.002
– year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0056
  article-title: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations (2nd Draft)
– volume: 4
  start-page: 5:1
  issue: 1
  year: 2013
  ident: 10.1016/j.cose.2021.102580_bib0033
  article-title: An analysis of security issues for cloud computing
  publication-title: J. Internet Serv. Appl.
  doi: 10.1186/1869-0238-4-5
– volume: 9
  issue: 2
  year: 2018
  ident: 10.1016/j.cose.2021.102580_bib0054
  article-title: Cloud computing-technologies
  publication-title: International Journal of Advanced Research in Computer Science
  doi: 10.26483/ijarcs.v9i2.5760
– volume: 48
  start-page: 347
  year: 2015
  ident: 10.1016/j.cose.2021.102580_bib0067
  article-title: A review on cloud data security and its mitigation techniques
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2015.04.192
SSID ssj0017688
Score 2.6467364
Snippet Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 102580
SubjectTerms Business
Classification
Cloud computing
Companies
Cybersecurity
IaaS
Migration
Outsourcing
PaaS
Polls & surveys
SaaS
Security
Service-based cloud computing
Services
Taxonomy
Title Cloud computing security: A survey of service-based models
URI https://dx.doi.org/10.1016/j.cose.2021.102580
https://www.proquest.com/docview/2639038928
Volume 114
WOSCitedRecordID wos000754417100006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLfKhhCXAYOJwUA5sFOVqnYcx9mtGq0YTAWpnVROlpM4areSdk1bTTvzh_Mcx0k7QQUHLlGUD7fy--X59_y-EPog0zBlKpEu5lK6NJWhy5lkLgtxGMQpVYyYZhNBv89Ho_Bbo_HT5sKsp0GW8bu7cP5fRQ3XQNg6dfYfxF0NChfgHIQORxA7HP9K8OfT2apIVZuvipDmvOxQZ3LQ89VirQqvem60hKvXscR0xMk3qart95AX6LCj1C6nhTTpIj1gqz_UuPllPKut-wGY-mO5Lh36WZJNagfIjcHgQKl6TfiubgyNBU04yWG0i3s42dySAGu2isky-2Q2V2agbleziWwOWp3NLUxdab1t6mu2lFG7PCAuI22-pZcx3dCs-Lf63mw9XLd0cD8Y-wTrUhS-6Q21XVy7_1X0ri4vxbA7Gp56vfmtqzuPaQ_9qffRoOAR2ieBH4Ju3O9cdEefK28UmGS8qhEP_7xMvjJxgg9_-k8E58FSX_CX4XN0UBoeTscA5gVqqOwQPbF5D4fomZW3U6r7l-isgJJTQcmxIDhzOo4BkjNLnS0gOQZIr9BVrzs8_-SWvTbc2CN86ZJAtSmTtJ2QhOIklkwqP5WMJ4xHhEYBCxUQm0jSiCns0XYEdrT0aah4ILEfe0doL5tl6jVysPISLwixnxCPylhXpEyBWHOa0hTYrDpG2E6QiMtC9LofylTYiMNroSdV6EkVZlKPUbN6Z27KsOx82rfzLkoiaQiiANzsfO_ECkmUX3QuCHB4XYWS8De7b79FT-uP4QTtLRcr9Q49jtfLSb54X2LqF0rumS0
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cloud+computing+security%3A+A+survey+of+service-based+models&rft.jtitle=Computers+%26+security&rft.au=Parast%2C+Fatemeh+Khoda&rft.au=Sindhav%2C+Chandni&rft.au=Nikam%2C+Seema&rft.au=Yekta%2C+Hadiseh+Izadi&rft.date=2022-03-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=114&rft.spage=1&rft_id=info:doi/10.1016%2Fj.cose.2021.102580&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon