Cloud computing security: A survey of service-based models
Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have inevitably entangled with businesses’ and individuals’ daily lives through products and services. On-demand, pay-per-use characteristics encourage cor...
Gespeichert in:
| Veröffentlicht in: | Computers & security Jg. 114; S. 102580 |
|---|---|
| Hauptverfasser: | , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Amsterdam
Elsevier Ltd
01.03.2022
Elsevier Sequoia S.A |
| Schlagworte: | |
| ISSN: | 0167-4048, 1872-6208 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have inevitably entangled with businesses’ and individuals’ daily lives through products and services. On-demand, pay-per-use characteristics encourage corporations to outsource part of their businesses to accelerate their services and multiply value. The latest market tendency toward migration to cloud environments, started in 2019, indicates a flourishing trend in the next few years. Despite the numerous benefits of the cloud computing model for businesses or individuals, security issues still have been stated as the top cloud challenge in 2020. Although various factors affect security, technologies enabling cloud computing such as virtualization and multitenancy, in addition to on-demand characteristics, initiate new security entrances for malevolent activities. In this study, we surveyed service-based cloud computing security issues to establish the current state of the field. The main contribution of this paper is to analyze the state of cloud security in the last decade and provide a unified taxonomy of security issues over the three-layer model, i.e., IaaS, PaaS, and SaaS. |
|---|---|
| AbstractList | Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have inevitably entangled with businesses' and individuals' daily lives through products and services. On-demand, pay-per-use characteristics encourage corporations to outsource part of their businesses to accelerate their services and multiply value. The latest market tendency toward migration to cloud environments, started in 2019, indicates a flourishing trend in the next few years. Despite the numerous benefits of the cloud computing model for businesses or individuals, security issues still have been stated as the top cloud challenge in 2020. Although various factors affect security, technologies enabling cloud computing such as virtualization and multitenancy, in addition to on-demand characteristics, initiate new security entrances for malevolent activities. In this study, we surveyed service-based cloud computing security issues to establish the current state of the field. The main contribution of this paper is to analyze the state of cloud security in the last decade and provide a unified taxonomy of security issues over the three-layer model, i.e., IaaS, PaaS, and SaaS. |
| ArticleNumber | 102580 |
| Author | Nikam, Seema Kent, Kenneth B. Izadi Yekta, Hadiseh Hakak, Saqib Sindhav, Chandni Khoda Parast, Fatemeh |
| Author_xml | – sequence: 1 givenname: Fatemeh surname: Khoda Parast fullname: Khoda Parast, Fatemeh email: fkhoda@unb.ca – sequence: 2 givenname: Chandni surname: Sindhav fullname: Sindhav, Chandni email: csindhav@unb.ca – sequence: 3 givenname: Seema surname: Nikam fullname: Nikam, Seema email: snikam@unb.ca – sequence: 4 givenname: Hadiseh surname: Izadi Yekta fullname: Izadi Yekta, Hadiseh email: hizadi@unb.ca – sequence: 5 givenname: Kenneth B. surname: Kent fullname: Kent, Kenneth B. email: ken@unb.ca – sequence: 6 givenname: Saqib surname: Hakak fullname: Hakak, Saqib email: shakak@unb.ca |
| BookMark | eNp9kD1rwzAURUVJoUnaP9DJ0NmpJMuSHLqE0C8IdGlnIUvPRcaxUkkO5N_XwZ06ZHpwuec-OAs0630PCN0TvCKY8Md2ZXyEFcWUjAEtJb5CcyIFzTnFcobmY0nkDDN5gxYxthgTwaWco_W284PNjN8fhuT67yyCGYJLp3W2yeIQjnDKfDOm4egM5LWOYLO9t9DFW3Td6C7C3d9doq-X58_tW777eH3fbna5KahMORWAGdcMW2oZsUZzDWWjubRc1pTVgleAuag1qzmQguGaMKlLVoEUmpSmWKKHafcQ_M8AManWD6EfXyrKiwoXsqJybNGpZYKPMUCjDsHtdTgpgtXZkWrV2ZE6O1KToxGS_yDjkk7O9ylo111GnyZ0NAFHB0FF46A3YF0Ak5T17hL-C9ehgvg |
| CitedBy_id | crossref_primary_10_1007_s00607_025_01479_y crossref_primary_10_3390_s23125577 crossref_primary_10_1016_j_cie_2024_110237 crossref_primary_10_3390_electronics12091983 crossref_primary_10_4018_IJCAC_308277 crossref_primary_10_1007_s10586_024_05021_1 crossref_primary_10_1109_ACCESS_2025_3529636 crossref_primary_10_1007_s12626_023_00140_4 crossref_primary_10_1007_s11276_024_03863_6 crossref_primary_10_1080_08874417_2024_2329985 crossref_primary_10_3390_app13169161 crossref_primary_10_1002_ett_70120 crossref_primary_10_3390_electronics12030717 crossref_primary_10_32725_ewp_2023_001 crossref_primary_10_3390_info13110544 crossref_primary_10_1007_s42979_023_02285_z crossref_primary_10_1049_sfw2_6662968 crossref_primary_10_1109_JIOT_2024_3506976 crossref_primary_10_3390_jcp3040034 crossref_primary_10_1007_s11227_025_07571_6 crossref_primary_10_1016_j_techsoc_2025_103057 crossref_primary_10_1088_1402_4896_ad69e0 crossref_primary_10_3390_s22228784 crossref_primary_10_4018_IJACI_332860 crossref_primary_10_1109_TCC_2024_3522993 crossref_primary_10_1109_TSC_2024_3433534 crossref_primary_10_1145_3708533 crossref_primary_10_24017_science_2025_2_4 crossref_primary_10_3389_fcomp_2025_1595624 crossref_primary_10_1007_s11042_025_21041_4 crossref_primary_10_1093_comjnl_bxae053 crossref_primary_10_1016_j_bprint_2023_e00321 crossref_primary_10_1002_cpe_7889 crossref_primary_10_1007_s10462_025_11320_9 crossref_primary_10_1155_2023_9210803 crossref_primary_10_3390_s23052760 crossref_primary_10_1186_s13677_024_00676_y crossref_primary_10_3390_s22239548 crossref_primary_10_1007_s11235_024_01166_x crossref_primary_10_1049_2024_1056705 crossref_primary_10_1002_ett_70020 crossref_primary_10_1007_s42979_025_04244_2 crossref_primary_10_3390_en15124316 crossref_primary_10_1109_ACCESS_2022_3231622 crossref_primary_10_1109_TCSS_2022_3177359 crossref_primary_10_1109_ACCESS_2025_3582705 crossref_primary_10_1109_ACCESS_2025_3580569 crossref_primary_10_1155_int_2969737 crossref_primary_10_1007_s11277_024_11311_z crossref_primary_10_1109_MIC_2022_3226757 |
| Cites_doi | 10.1504/IJGUC.2021.112475 10.1186/s13677-017-0098-8 10.26438/ijcse/v7i4.11311136 10.1016/j.jnca.2017.06.001 10.1109/TPDS.2015.2398438 10.1016/j.procs.2016.05.156 10.1007/s10845-012-0661-6 10.1016/j.future.2017.08.016 10.5815/ijitcs.2017.06.07 10.1007/s42979-020-00353-2 10.1109/MSP.2010.115 10.1109/MCC.2018.053711671 10.1016/j.cose.2011.10.006 10.1016/j.future.2017.02.022 10.17485/ijst/2019/v12i3/139557 10.1007/s41870-018-0108-1 10.1145/2775111 10.1016/j.dss.2018.12.005 10.1007/s12045-014-0030-1 10.1007/s11227-020-03213-1 10.5626/JCSE.2015.9.3.119 10.1016/j.procs.2015.04.245 10.1016/j.future.2010.12.006 10.1007/s00607-010-0140-x 10.1007/s10207-013-0208-7 10.1016/j.jnca.2016.05.010 10.1007/s11227-012-0831-5 10.1016/j.compeleceng.2016.03.004 10.1016/j.jnca.2016.11.027 10.1016/j.jnca.2016.09.002 10.1109/MCOM.2018.1700621 10.1109/TCC.2015.2415794 10.1016/j.ins.2015.01.025 10.1016/j.future.2016.10.008 10.1016/j.comnet.2019.01.013 10.1145/2767181 10.1016/j.jnca.2013.10.004 10.1016/j.proeng.2017.01.087 10.1016/j.jnca.2010.07.006 10.1016/j.cosrev.2019.05.002 10.1186/1869-0238-4-5 10.26483/ijarcs.v9i2.5760 10.1016/j.procs.2015.04.192 |
| ContentType | Journal Article |
| Copyright | 2021 Elsevier Ltd Copyright Elsevier Sequoia S.A. Mar 2022 |
| Copyright_xml | – notice: 2021 Elsevier Ltd – notice: Copyright Elsevier Sequoia S.A. Mar 2022 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
| DOI | 10.1016/j.cose.2021.102580 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Business |
| EISSN | 1872-6208 |
| ExternalDocumentID | 10_1016_j_cose_2021_102580 S0167404821003977 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD JQ2 K7. L7M L~C L~D |
| ID | FETCH-LOGICAL-c328t-27e046a40d2d41dca6ae5fa68d68b24b769e067ba4b6e1340b148a549e87a15c3 |
| ISICitedReferencesCount | 87 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000754417100006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-4048 |
| IngestDate | Thu Nov 20 01:16:03 EST 2025 Tue Nov 18 22:17:18 EST 2025 Sat Nov 29 07:26:05 EST 2025 Fri Feb 23 02:40:24 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | IaaS Cloud computing Service-based cloud computing Security PaaS SaaS |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c328t-27e046a40d2d41dca6ae5fa68d68b24b769e067ba4b6e1340b148a549e87a15c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2639038928 |
| PQPubID | 46289 |
| ParticipantIDs | proquest_journals_2639038928 crossref_primary_10_1016_j_cose_2021_102580 crossref_citationtrail_10_1016_j_cose_2021_102580 elsevier_sciencedirect_doi_10_1016_j_cose_2021_102580 |
| PublicationCentury | 2000 |
| PublicationDate | March 2022 2022-03-00 20220301 |
| PublicationDateYYYYMMDD | 2022-03-01 |
| PublicationDate_xml | – month: 03 year: 2022 text: March 2022 |
| PublicationDecade | 2020 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Computers & security |
| PublicationYear | 2022 |
| Publisher | Elsevier Ltd Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
| References | Machado, Hausheer, Stiller (bib0053) 2009 Khan, Al-Yasiri (bib0044) 2016 Bouayad, Blilat, Mejhed, Ghazi (bib0016) 2012 Huang, Ganjali, Kim, Oh, Lie (bib0035) 2015; 47 Bach-Nutman (bib0009) 2020 Selvamani, Jayanthi (bib0067) 2015; 48 Ali, Khan, Vasilakos (bib0002) 2015; 305 Almorsy, Grundy, Müller (bib0003) 2016 Verma, Kaushal (bib0080) 2011 Coppolino, D’Antonio, Mazzeo, Romano (bib0021) 2017; 59 e Rubab, Azhar, Anwar, Majeed (bib0065) 2020; 2 Halboob, Abbas, Haouam, Yaseen (bib0032) 2014 Rodero-Merino, Vaquero, Caron, Muresan, Desprez (bib0064) 2012; 31 Loukis, Janssen, Mintchev (bib0052) 2019; 117 Vasiljeva, Shaikhulina, Kreslins (bib0079) 2017; 178 Zissis, Lekkas (bib0086) 2012; 28 Barrowclough, Asif (bib0011) 2018; 2018 Krishna, Kiran, Murali, Reddy (bib0046) 2016; 87 Ghobaei-Arani, Jabbehdari, Pourmina (bib0028) 2018; 78 Singh, Chatterjee (bib0071) 2017; 79 Freet, Agrawal, John, Walker (bib0026) 2015 Li (bib0049) 2020 Agarwal, Kaushal, Chouhan (bib0001) 2020 Asvija, Eswari, Bijoy (bib0008) 2019; 151 Grobauer, Walloschek, Stöcker (bib0030) 2011; 9 Singh, Jeong, Park (bib0073) 2016; 75 Fernandes, Soares, Gomes, Freire, Inácio (bib0024) 2014; 13 Hwang, Bai, Shi, Li, Chen, Wu (bib0036) 2016; 27 George Amalarethinam, Rajakumari (bib0027) 2019 Cook (bib0020) 2018 Kritikos, Kirkham, Kryza, Massonet (bib0047) 2017; 67 Rajaraman (bib0061) 2014; 19 Kaur, Raj, Yadav, Choudhury (bib0041) 2018 Li, Zhou, Shi, Guo (bib0050) 2010 Modi, Patel, Borisaniya, Patel, Rajarajan (bib0057) 2013; 63 Yan, Huang, Luo, Gong, Yu (bib0084) 2018; 56 Almutairy (bib0004) 2019 Bauman, Ayoade, Lin (bib0013) 2015; 48 Flexera (bib0025) 2020 Hay, Nance, Bishop (bib0034) 2011 Gonzales, Kaplan, Saltzman, Winkelman, Woods (bib0029) 2017; 5 Anwar, Inayat, Zolkipli, Zain, Gani, Anuar, Khan, Chang (bib0006) 2017; 93 Shaikh, Meshram (bib0069) 2020 Cabuk, Dalton, Edwards, Fischer (bib0017) 2008 Rashid, Chaturvedi (bib0063) 2019; 7 Vaquero, Rodero-Merino, Morán (bib0077) 2011; 91 Varghese, Buyya (bib0078) 2017 Sandikkaya, Harmanci (bib0066) 2012 Zhang, Zhang, Ou (bib0085) 2014 Toraskar, Borse (bib0076) 2018; 975 Guerbouj, Gharsellaoui, Bouamama (bib0031) 2019; 10 Panda, Behera, Jena (bib0059) 2021 Basu, Bardhan, Gupta, Saha, Pal, Bose, Basu, Chaudhury, Sarkar (bib0012) 2018 Kim, Vouk (bib0045) 2014 Sengupta, Kaulgud, Sharma (bib0068) 2011 Chouhan, Yao, Sezer (bib0019) 2015 Liu, Sun, Ryoo, Rizvi, Vasilakos (bib0051) 2015; 9 Arora, Wadhawan, Ahuja (bib0007) 2012; 2 Subashini, Kavitha (bib0074) 2011; 34 Shyam, Theja (bib0070) 2021; 12 IBM Cloud Education, 2021. IaaS vs PaaS vs SaaS, understand and compare the three most popular cloud computing service models. McKay, Cooper (bib0056) 2018 Tabrizchi, Rafsanjani (bib0075) 2020; 76 Bohn, Messina, Liu, Tong, Mao (bib0015) 2011 Kamongi, Kotikela, Kavi, Gomathisankaran, Singhal (bib0040) 2013 Bahrami, Singhal (bib0010) 2015 Deshmukh, Devadkar (bib0022) 2015; 49 Diaby, Rad (bib0023) 2017; 9 Weinman (bib0083) 2018; 5 Manvi, Shyam (bib0055) 2014; 41 Pancholi, Patel (bib0058) 2016; 2 Khan (bib0043) 2016; 71 Wang, Liu, Sun, Zou, Yang (bib0082) 2014; 25 Hashizume, Rosado, Fernández-Medina, Fernández (bib0033) 2013; 4 Chawki, Ahmed, Zakariae (bib0018) 2018 Malik, Wani, Rashid (bib0054) 2018; 9 Verma, Adhikari (bib0081) 2020; 1 Singh (bib0072) 2019; 11 Amato, Moscato, Moscato, Colace (bib0005) 2018; 87 Khalaf, Mostafa, Mustapha, Ismaila, Mahmoud, Jubaira, Hassan (bib0042) 2019; 26 Becker, Brataas, Cecowski, Huljenic, Lehrig, Stupar (bib0014) 2017 Pham, Liu, Zheng, Fu, Deshpande, Xia, Zhou, Abdelrazek (bib0060) 2017 Rakotondravony, Taubmann, Mandarawi, Weishäupl, Xu, Kolosnjaji, Protsenko, de Meer, Reiser (bib0062) 2017; 6 Isharufe, Jaafar, Butakov (bib0038) 2020 Jabir, Khanji, Ahmad, Alfandi, Said (bib0039) 2016 Kumar, Goyal (bib0048) 2019; 33 McKay (10.1016/j.cose.2021.102580_bib0056) 2018 Sengupta (10.1016/j.cose.2021.102580_bib0068) 2011 e Rubab (10.1016/j.cose.2021.102580_bib0065) 2020; 2 Vaquero (10.1016/j.cose.2021.102580_bib0077) 2011; 91 Cook (10.1016/j.cose.2021.102580_bib0020) 2018 Freet (10.1016/j.cose.2021.102580_bib0026) 2015 Zissis (10.1016/j.cose.2021.102580_bib0086) 2012; 28 Arora (10.1016/j.cose.2021.102580_bib0007) 2012; 2 Machado (10.1016/j.cose.2021.102580_bib0053) 2009 Verma (10.1016/j.cose.2021.102580_bib0081) 2020; 1 Bohn (10.1016/j.cose.2021.102580_bib0015) 2011 Basu (10.1016/j.cose.2021.102580_bib0012) 2018 Varghese (10.1016/j.cose.2021.102580_sbref0078) 2017 Kritikos (10.1016/j.cose.2021.102580_bib0047) 2017; 67 Almutairy (10.1016/j.cose.2021.102580_bib0004) 2019 Amato (10.1016/j.cose.2021.102580_bib0005) 2018; 87 Modi (10.1016/j.cose.2021.102580_bib0057) 2013; 63 Pham (10.1016/j.cose.2021.102580_bib0060) 2017 Becker (10.1016/j.cose.2021.102580_bib0014) 2017 Kaur (10.1016/j.cose.2021.102580_bib0041) 2018 10.1016/j.cose.2021.102580_bib0037 Isharufe (10.1016/j.cose.2021.102580_bib0038) 2020 Tabrizchi (10.1016/j.cose.2021.102580_bib0075) 2020; 76 Kumar (10.1016/j.cose.2021.102580_bib0048) 2019; 33 Anwar (10.1016/j.cose.2021.102580_bib0006) 2017; 93 Malik (10.1016/j.cose.2021.102580_bib0054) 2018; 9 Singh (10.1016/j.cose.2021.102580_bib0073) 2016; 75 Ali (10.1016/j.cose.2021.102580_bib0002) 2015; 305 Zhang (10.1016/j.cose.2021.102580_bib0085) 2014 Hay (10.1016/j.cose.2021.102580_bib0034) 2011 Selvamani (10.1016/j.cose.2021.102580_bib0067) 2015; 48 George Amalarethinam (10.1016/j.cose.2021.102580_bib0027) 2019 Toraskar (10.1016/j.cose.2021.102580_bib0076) 2018; 975 Rajaraman (10.1016/j.cose.2021.102580_bib0061) 2014; 19 Bauman (10.1016/j.cose.2021.102580_bib0013) 2015; 48 Bach-Nutman (10.1016/j.cose.2021.102580_sbref0009) 2020 Deshmukh (10.1016/j.cose.2021.102580_bib0022) 2015; 49 Rashid (10.1016/j.cose.2021.102580_bib0063) 2019; 7 Barrowclough (10.1016/j.cose.2021.102580_bib0011) 2018; 2018 Vasiljeva (10.1016/j.cose.2021.102580_bib0079) 2017; 178 Bouayad (10.1016/j.cose.2021.102580_bib0016) 2012 Khalaf (10.1016/j.cose.2021.102580_bib0042) 2019; 26 Gonzales (10.1016/j.cose.2021.102580_bib0029) 2017; 5 Grobauer (10.1016/j.cose.2021.102580_bib0030) 2011; 9 Weinman (10.1016/j.cose.2021.102580_bib0083) 2018; 5 Ghobaei-Arani (10.1016/j.cose.2021.102580_bib0028) 2018; 78 Khan (10.1016/j.cose.2021.102580_bib0043) 2016; 71 Chawki (10.1016/j.cose.2021.102580_bib0018) 2018 Panda (10.1016/j.cose.2021.102580_bib0059) 2021 Agarwal (10.1016/j.cose.2021.102580_bib0001) 2020 Krishna (10.1016/j.cose.2021.102580_bib0046) 2016; 87 Khan (10.1016/j.cose.2021.102580_bib0044) 2016 Hwang (10.1016/j.cose.2021.102580_bib0036) 2016; 27 Manvi (10.1016/j.cose.2021.102580_bib0055) 2014; 41 Asvija (10.1016/j.cose.2021.102580_bib0008) 2019; 151 Cabuk (10.1016/j.cose.2021.102580_bib0017) 2008 Subashini (10.1016/j.cose.2021.102580_bib0074) 2011; 34 Verma (10.1016/j.cose.2021.102580_bib0080) 2011 Shaikh (10.1016/j.cose.2021.102580_bib0069) 2020 Flexera (10.1016/j.cose.2021.102580_bib0025) 2020 Coppolino (10.1016/j.cose.2021.102580_bib0021) 2017; 59 Loukis (10.1016/j.cose.2021.102580_bib0052) 2019; 117 Hashizume (10.1016/j.cose.2021.102580_bib0033) 2013; 4 Huang (10.1016/j.cose.2021.102580_bib0035) 2015; 47 Liu (10.1016/j.cose.2021.102580_bib0051) 2015; 9 Kim (10.1016/j.cose.2021.102580_bib0045) 2014 Li (10.1016/j.cose.2021.102580_bib0050) 2010 Chouhan (10.1016/j.cose.2021.102580_bib0019) 2015 Kamongi (10.1016/j.cose.2021.102580_bib0040) 2013 Rodero-Merino (10.1016/j.cose.2021.102580_bib0064) 2012; 31 Guerbouj (10.1016/j.cose.2021.102580_bib0031) 2019; 10 Yan (10.1016/j.cose.2021.102580_bib0084) 2018; 56 Wang (10.1016/j.cose.2021.102580_bib0082) 2014; 25 Halboob (10.1016/j.cose.2021.102580_bib0032) 2014 Singh (10.1016/j.cose.2021.102580_bib0071) 2017; 79 Singh (10.1016/j.cose.2021.102580_bib0072) 2019; 11 Almorsy (10.1016/j.cose.2021.102580_sbref0003) 2016 Rakotondravony (10.1016/j.cose.2021.102580_bib0062) 2017; 6 Fernandes (10.1016/j.cose.2021.102580_bib0024) 2014; 13 Jabir (10.1016/j.cose.2021.102580_bib0039) 2016 Shyam (10.1016/j.cose.2021.102580_bib0070) 2021; 12 Li (10.1016/j.cose.2021.102580_sbref0049) 2020 Pancholi (10.1016/j.cose.2021.102580_bib0058) 2016; 2 Bahrami (10.1016/j.cose.2021.102580_bib0010) 2015 Diaby (10.1016/j.cose.2021.102580_bib0023) 2017; 9 Sandikkaya (10.1016/j.cose.2021.102580_bib0066) 2012 |
| References_xml | – volume: 63 start-page: 561 year: 2013 end-page: 592 ident: bib0057 article-title: A survey on security issues and solutions at different layers of cloud computing publication-title: J. Supercomput. – year: 2020 ident: bib0049 article-title: Vulnerabilities Mapping Based on OWASP-SANS: a Survey for Static Application Security Testing (SAST) – start-page: 285 year: 2017 end-page: 287 ident: bib0060 article-title: Paas - black or white: an investigation into software development model for building retail industry saas publication-title: Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20–28, 2017 - Companion Volume – volume: 67 start-page: 206 year: 2017 end-page: 226 ident: bib0047 article-title: Towards a security-enhanced paas platform for multi-cloud applications publication-title: Future Gener. Comput. Syst. – start-page: 158 year: 2015 end-page: 165 ident: bib0010 article-title: DCCSOA: A dynamic cloud computing service-oriented architecture publication-title: 2015 IEEE International Conference on Information Reuse and Integration, IRI 2015, San Francisco, CA, USA, August 13–15, 2015 – start-page: 148 year: 2015 end-page: 155 ident: bib0026 article-title: Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS publication-title: Proceedings of the 7th International Conference on Management of Computational and Collective Intelligence in Digital EcoSystems, Caraguatatuba, Brazil, October 25, - 29, 2015 – start-page: 1 year: 2011 end-page: 7 ident: bib0034 article-title: Storm clouds rising: Security challenges for iaas cloud computing publication-title: 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), Proceedings, 4–7 January 2011, Koloa, Kauai, HI, USA – volume: 33 start-page: 1 year: 2019 end-page: 48 ident: bib0048 article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey publication-title: Comput. Sci. Rev. – volume: 117 start-page: 38 year: 2019 end-page: 47 ident: bib0052 article-title: Determinants of software-as-a-service benefits and impact on firm performance publication-title: Decis. Support Syst. – volume: 75 start-page: 200 year: 2016 end-page: 222 ident: bib0073 article-title: A survey on cloud computing security: issues, threats, and solutions publication-title: J. Netw. Comput. Appl. – start-page: 119 year: 2020 end-page: 134 ident: bib0001 article-title: A survey on cloud computing security issues and cryptographic techniques publication-title: Social Networking and Computational Intelligence – volume: 91 start-page: 93 year: 2011 end-page: 118 ident: bib0077 article-title: Locking the sky: a survey on iaas cloud security publication-title: Computing – start-page: 59 year: 2014 end-page: 63 ident: bib0045 article-title: A survey of common security vulnerabilities and corresponding countermeasures for saas publication-title: 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8–12, 2014 – volume: 76 start-page: 9493 year: 2020 end-page: 9532 ident: bib0075 article-title: A survey on security challenges in cloud computing: issues, threats, and solutions publication-title: J. Supercomput. – start-page: 485 year: 2016 end-page: 490 ident: bib0044 article-title: Identifying cloud security threats to strengthen cloud computing adoption framework publication-title: The 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, August 15–18, 2016, Montreal, Quebec, Canada – start-page: 328 year: 2018 end-page: 333 ident: bib0018 article-title: Iaas cloud model security issues on behalf cloud provider and user security behaviors publication-title: The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, Gran Canaria, Spain, August 13–15, 2018 – volume: 25 start-page: 283 year: 2014 end-page: 291 ident: bib0082 article-title: Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing publication-title: J. Intell. Manuf. – volume: 5 start-page: 101 year: 2018 ident: bib0083 article-title: The economics of pay-per-use pricing publication-title: IEEE Cloud Comput. – volume: 19 start-page: 242 year: 2014 end-page: 258 ident: bib0061 article-title: Cloud computing publication-title: Resonance – start-page: 2843 year: 2010 end-page: 2848 ident: bib0050 article-title: A trusted computing environment model in cloud architecture publication-title: International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11–14, 2010, Proceedings – reference: IBM Cloud Education, 2021. IaaS vs PaaS vs SaaS, understand and compare the three most popular cloud computing service models. – start-page: 218 year: 2013 end-page: 226 ident: bib0040 article-title: VULCAN: vulnerability assessment framework for cloud computing publication-title: IEEE 7th International Conference on Software Security and Reliability, SERE 2013, Gaithersburg, MD, USA, June 18–20, 2013 – volume: 41 start-page: 424 year: 2014 end-page: 440 ident: bib0055 article-title: Resource management for infrastructure as a service (iaas) in cloud computing: a survey publication-title: J. Netw. Comput. Appl. – volume: 4 start-page: 5:1 year: 2013 end-page: 5:13 ident: bib0033 article-title: An analysis of security issues for cloud computing publication-title: J. Internet Serv. Appl. – volume: 9 year: 2018 ident: bib0054 article-title: Cloud computing-technologies publication-title: International Journal of Advanced Research in Computer Science – year: 2020 ident: bib0009 article-title: Understanding the Top 10 deldDel deliIns deltThinspace OWASP Vulnerabilities – year: 2019 ident: bib0027 article-title: A Survey on Security Challenges in Cloud Computing – start-page: 347 year: 2018 end-page: 356 ident: bib0012 article-title: Cloud computing security challenges & solutions-a survey publication-title: IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018, Las Vegas, NV, USA, January 8–10, 2018 – volume: 48 start-page: 347 year: 2015 end-page: 352 ident: bib0067 article-title: A review on cloud data security and its mitigation techniques publication-title: Procedia Comput Sci – volume: 71 start-page: 11 year: 2016 end-page: 29 ident: bib0043 article-title: A survey of security issues for cloud computing publication-title: J. Netw. Comput. Appl. – volume: 13 start-page: 113 year: 2014 end-page: 170 ident: bib0024 article-title: Security issues in cloud environments: a survey publication-title: Int. J. Inf. Sec. – volume: 2 start-page: 29 year: 2020 end-page: 35 ident: bib0065 article-title: Security threats in cloud computing: trend and challenges publication-title: International Journal of Computing and Communication Networks – start-page: 26 year: 2012 end-page: 31 ident: bib0016 article-title: Cloud computing: Security challenges publication-title: 2012 Colloquium in Information Science and Technology, CIST 2012, Fez, Morocco, October 22–24, 2012 – year: 2018 ident: bib0056 article-title: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations (2nd Draft) publication-title: Technical Report – volume: 79 start-page: 88 year: 2017 end-page: 115 ident: bib0071 article-title: Cloud security issues and challenges: a survey publication-title: J. Netw. Comput. Appl. – volume: 31 start-page: 96 year: 2012 end-page: 108 ident: bib0064 article-title: Building safe paas clouds: a survey on security in multitenant software platforms publication-title: Comput. Secur. – volume: 34 start-page: 1 year: 2011 end-page: 11 ident: bib0074 article-title: A survey on security issues in service delivery models of cloud computing publication-title: J. Netw. Comput. Appl. – volume: 59 start-page: 126 year: 2017 end-page: 140 ident: bib0021 article-title: Cloud security: emerging threats and current solutions publication-title: Comput. Electr. Eng. – volume: 151 start-page: 68 year: 2019 end-page: 92 ident: bib0008 article-title: Security in hardware assisted virtualization for cloud computing - state of the art issues and challenges publication-title: Comput. Networks – start-page: 3 year: 2017 end-page: 21 ident: bib0014 article-title: Introduction publication-title: Engineering Scalable, Elastic, and Cost-Efficient Cloud Computing Applications - The CloudScale Method – volume: 9 start-page: 50 year: 2017 end-page: 58 ident: bib0023 article-title: Cloud computing: a review of the concepts and deployment models publication-title: International Journal of Information Technology and Computer Science – volume: 87 start-page: 246 year: 2016 end-page: 251 ident: bib0046 article-title: Security issues in service model of cloud computing environment publication-title: Procedia Comput Sci – volume: 87 start-page: 754 year: 2018 end-page: 764 ident: bib0005 article-title: Improving security in cloud by formal modeling of iaas resources publication-title: Future Generation Computer Systems – volume: 93 start-page: 259 year: 2017 end-page: 279 ident: bib0006 article-title: Cross-vm cache-based side channel attacks and proposed prevention mechanisms: a survey publication-title: J. Netw. Comput. Appl. – volume: 27 start-page: 130 year: 2016 end-page: 143 ident: bib0036 article-title: Cloud performance modeling with benchmark evaluation of elastic scaling strategies publication-title: IEEE Trans. Parallel Distributed Syst. – volume: 975 start-page: 8887 year: 2018 ident: bib0076 article-title: Implementation of cloud computing service delivery models (IaaS, PaaS) by aws and microsoft azure: a survey publication-title: Int J Comput Appl – volume: 9 year: 2015 ident: bib0051 article-title: A survey of security and privacy challenges in cloud computing: solutions and future directions publication-title: J. Comput. Sci. Eng. – start-page: 513 year: 2021 end-page: 524 ident: bib0059 article-title: A survey on cloud computing security issues, attacks and countermeasures publication-title: Advances in Machine Learning and Computational Intelligence – volume: 1 start-page: 1 year: 2020 end-page: 8 ident: bib0081 article-title: Cloud computing security issues: a stakeholder’s perspective publication-title: SN Computer Science – volume: 10 start-page: 32 year: 2019 end-page: 44 ident: bib0031 article-title: A comprehensive survey on privacy and security issues in cloud computing, internet of things and cloud of things publication-title: Int. J. Serv. Sci. Manag. Eng. Technol. – start-page: 63 year: 2020 end-page: 77 ident: bib0069 article-title: Security issues in cloud computing publication-title: Intelligent Computing and Networking – year: 2020 ident: bib0025 article-title: Flexera 2020 state of the cloud report publication-title: Applied Computing and Informatics – year: 2016 ident: bib0003 article-title: An Analysis of the Cloud Computing Security Problem – volume: 2 start-page: 18 year: 2016 end-page: 21 ident: bib0058 article-title: Enhancement of cloud computing security with secure data storage using aes publication-title: International Journal for Innovative Research in Science and Technology – year: 2019 ident: bib0004 article-title: A taxonomy of virtualization security issues in cloud computing environments publication-title: Indian Journal of Science and Technology – volume: 7 start-page: 1131 year: 2019 end-page: 1136 ident: bib0063 article-title: Virtualization and its role in cloud computing environment publication-title: International Journal of Computer Sciences and Engineering – volume: 11 start-page: 683 year: 2019 end-page: 690 ident: bib0072 article-title: Security concerns and countermeasures in cloud computing: a qualitative analysis publication-title: International Journal of Information Technology – volume: 78 start-page: 191 year: 2018 end-page: 210 ident: bib0028 article-title: An autonomic resource provisioning approach for service-based cloud applications: a hybrid approach publication-title: Future Gener. Comput. Syst. – start-page: 1 year: 2020 end-page: 6 ident: bib0038 article-title: Study of security issues in platform-as-a-service (PAAS) cloud model publication-title: 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) – volume: 28 start-page: 583 year: 2012 end-page: 592 ident: bib0086 article-title: Addressing cloud computing security issues publication-title: Future Gener. Comput. Syst. – start-page: 38 year: 2018 end-page: 47 ident: bib0020 article-title: Formal reasoning about the security of amazon web services publication-title: Computer Aided Verification - 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14–17, 2018, Proceedings, Part I – start-page: 516 year: 2018 end-page: 520 ident: bib0041 article-title: Performance evaluation of aws and ibm cloud platforms for security mechanism publication-title: 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS) – year: 2017 ident: bib0078 article-title: Next Generation Cloud Computing: New Trends and Research Directions – volume: 2018 start-page: 1681908:1 year: 2018 end-page: 1681908:20 ident: bib0011 article-title: Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures publication-title: Secur. Commun. Networks – year: 2009 ident: bib0053 article-title: Considerations on the interoperability of and between cloud computing standards publication-title: 27th open Grid Forum (OGF27), G2C-Net Workshop: From Grid to Cloud Networks – volume: 49 start-page: 202 year: 2015 end-page: 210 ident: bib0022 article-title: Understanding ddos attack & its effect in cloud environment publication-title: Procedia Comput Sci – volume: 26 start-page: 188 year: 2019 end-page: 197 ident: bib0042 article-title: A simulation study of syn flood attack in cloud computing environment publication-title: AUS journal – volume: 48 start-page: 10:1 year: 2015 end-page: 10:33 ident: bib0013 article-title: A survey on hypervisor-based monitoring: approaches, applications, and evolutions publication-title: ACM Comput. Surv. – start-page: 162 year: 2015 end-page: 170 ident: bib0019 article-title: Software as a service: Understanding security issues publication-title: 2015 Science and Information Conference (SAI) – volume: 5 start-page: 523 year: 2017 end-page: 536 ident: bib0029 article-title: Cloud-trust - a security assessment model for infrastructure as a service (iaas) clouds publication-title: IEEE Trans. Cloud Comput. – volume: 6 start-page: 26 year: 2017 ident: bib0062 article-title: Classifying malware attacks in iaas cloud environments publication-title: J. Cloud Comput. – start-page: 317 year: 2014 end-page: 328 ident: bib0085 article-title: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud publication-title: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan - June 03 - 06, 2014 – volume: 2 year: 2012 ident: bib0007 article-title: Cloud computing security issues in infrastructure as a service publication-title: International journal of advanced research in computer science and software engineering – start-page: 594 year: 2011 end-page: 596 ident: bib0015 article-title: NIST cloud computing reference architecture publication-title: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4–9, 2011 – year: 2008 ident: bib0017 article-title: A comparative study on secure network virtualization publication-title: HP Laboratories – volume: 178 start-page: 443 year: 2017 end-page: 451 ident: bib0079 article-title: Cloud computing: business perspectives, benefits and challenges for small and medium enterprises (case of latvia) publication-title: Procedia Eng – volume: 12 start-page: 1 year: 2021 end-page: 14 ident: bib0070 article-title: A survey on resolving security issues in saas through software defined networks publication-title: Int. J. Grid Util. Comput. – start-page: 117 year: 2016 end-page: 123 ident: bib0039 article-title: Analysis of cloud computing attacks and countermeasures publication-title: 2016 18th International Conference on Advanced Communication Technology (ICACT) – volume: 305 start-page: 357 year: 2015 end-page: 383 ident: bib0002 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. – start-page: 524 year: 2011 end-page: 531 ident: bib0068 article-title: Cloud computing security-trends and research directions publication-title: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4–9, 2011 – start-page: 434 year: 2014 end-page: 443 ident: bib0032 article-title: Dynamically changing service level agreements (slas) management in cloud computing publication-title: Intelligent Computing Methodologies - 10th International Conference, ICIC 2014, Taiyuan, China, August 3–6, 2014. Proceedings – volume: 47 start-page: 68:1 year: 2015 end-page: 68:31 ident: bib0035 article-title: The state of public infrastructure-as-a-service cloud security publication-title: ACM Comput. Surv. – start-page: 445 year: 2011 end-page: 454 ident: bib0080 article-title: Cloud computing security issues and challenges: A survey publication-title: Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22–24, 2011, Proceedings, Part IV – volume: 56 start-page: 30 year: 2018 end-page: 36 ident: bib0084 article-title: A multi-level ddos mitigation framework for the industrial internet of things publication-title: IEEE Commun. Mag. – volume: 9 start-page: 50 year: 2011 end-page: 57 ident: bib0030 article-title: Understanding cloud computing vulnerabilities publication-title: IEEE Secur. Priv. – start-page: 463 year: 2012 end-page: 468 ident: bib0066 article-title: Security problems of platform-as-a-service (PaaS) clouds and practical solutions to the problems publication-title: IEEE 31st Symposium on Reliable Distributed Systems, SRDS 2012, Irvine, CA, USA, October 8–11, 2012 – start-page: 158 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0010 article-title: DCCSOA: A dynamic cloud computing service-oriented architecture – start-page: 119 year: 2020 ident: 10.1016/j.cose.2021.102580_bib0001 article-title: A survey on cloud computing security issues and cryptographic techniques – volume: 26 start-page: 188 issue: 1 year: 2019 ident: 10.1016/j.cose.2021.102580_bib0042 article-title: A simulation study of syn flood attack in cloud computing environment publication-title: AUS journal – volume: 12 start-page: 1 issue: 1 year: 2021 ident: 10.1016/j.cose.2021.102580_bib0070 article-title: A survey on resolving security issues in saas through software defined networks publication-title: Int. J. Grid Util. Comput. doi: 10.1504/IJGUC.2021.112475 – volume: 6 start-page: 26 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0062 article-title: Classifying malware attacks in iaas cloud environments publication-title: J. Cloud Comput. doi: 10.1186/s13677-017-0098-8 – volume: 7 start-page: 1131 issue: 4 year: 2019 ident: 10.1016/j.cose.2021.102580_bib0063 article-title: Virtualization and its role in cloud computing environment publication-title: International Journal of Computer Sciences and Engineering doi: 10.26438/ijcse/v7i4.11311136 – volume: 93 start-page: 259 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0006 article-title: Cross-vm cache-based side channel attacks and proposed prevention mechanisms: a survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2017.06.001 – start-page: 1 year: 2020 ident: 10.1016/j.cose.2021.102580_bib0038 article-title: Study of security issues in platform-as-a-service (PAAS) cloud model – volume: 27 start-page: 130 issue: 1 year: 2016 ident: 10.1016/j.cose.2021.102580_bib0036 article-title: Cloud performance modeling with benchmark evaluation of elastic scaling strategies publication-title: IEEE Trans. Parallel Distributed Syst. doi: 10.1109/TPDS.2015.2398438 – volume: 87 start-page: 246 year: 2016 ident: 10.1016/j.cose.2021.102580_bib0046 article-title: Security issues in service model of cloud computing environment publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2016.05.156 – volume: 25 start-page: 283 issue: 2 year: 2014 ident: 10.1016/j.cose.2021.102580_bib0082 article-title: Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing publication-title: J. Intell. Manuf. doi: 10.1007/s10845-012-0661-6 – year: 2020 ident: 10.1016/j.cose.2021.102580_sbref0009 – volume: 87 start-page: 754 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0005 article-title: Improving security in cloud by formal modeling of iaas resources publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2017.08.016 – year: 2009 ident: 10.1016/j.cose.2021.102580_bib0053 article-title: Considerations on the interoperability of and between cloud computing standards – volume: 9 start-page: 50 issue: 6 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0023 article-title: Cloud computing: a review of the concepts and deployment models publication-title: International Journal of Information Technology and Computer Science doi: 10.5815/ijitcs.2017.06.07 – start-page: 328 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0018 article-title: Iaas cloud model security issues on behalf cloud provider and user security behaviors – start-page: 445 year: 2011 ident: 10.1016/j.cose.2021.102580_bib0080 article-title: Cloud computing security issues and challenges: A survey – volume: 2 start-page: 18 issue: 9 year: 2016 ident: 10.1016/j.cose.2021.102580_bib0058 article-title: Enhancement of cloud computing security with secure data storage using aes publication-title: International Journal for Innovative Research in Science and Technology – start-page: 317 year: 2014 ident: 10.1016/j.cose.2021.102580_bib0085 article-title: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud – start-page: 38 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0020 article-title: Formal reasoning about the security of amazon web services – start-page: 1 year: 2011 ident: 10.1016/j.cose.2021.102580_bib0034 article-title: Storm clouds rising: Security challenges for iaas cloud computing – volume: 1 start-page: 1 issue: 6 year: 2020 ident: 10.1016/j.cose.2021.102580_bib0081 article-title: Cloud computing security issues: a stakeholder’s perspective publication-title: SN Computer Science doi: 10.1007/s42979-020-00353-2 – start-page: 162 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0019 article-title: Software as a service: Understanding security issues – start-page: 485 year: 2016 ident: 10.1016/j.cose.2021.102580_bib0044 article-title: Identifying cloud security threats to strengthen cloud computing adoption framework – start-page: 26 year: 2012 ident: 10.1016/j.cose.2021.102580_bib0016 article-title: Cloud computing: Security challenges – volume: 9 start-page: 50 issue: 2 year: 2011 ident: 10.1016/j.cose.2021.102580_bib0030 article-title: Understanding cloud computing vulnerabilities publication-title: IEEE Secur. Priv. doi: 10.1109/MSP.2010.115 – year: 2008 ident: 10.1016/j.cose.2021.102580_bib0017 article-title: A comparative study on secure network virtualization publication-title: HP Laboratories – volume: 5 start-page: 101 issue: 5 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0083 article-title: The economics of pay-per-use pricing publication-title: IEEE Cloud Comput. doi: 10.1109/MCC.2018.053711671 – volume: 31 start-page: 96 issue: 1 year: 2012 ident: 10.1016/j.cose.2021.102580_bib0064 article-title: Building safe paas clouds: a survey on security in multitenant software platforms publication-title: Comput. Secur. doi: 10.1016/j.cose.2011.10.006 – start-page: 463 year: 2012 ident: 10.1016/j.cose.2021.102580_bib0066 article-title: Security problems of platform-as-a-service (PaaS) clouds and practical solutions to the problems – volume: 78 start-page: 191 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0028 article-title: An autonomic resource provisioning approach for service-based cloud applications: a hybrid approach publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.02.022 – year: 2019 ident: 10.1016/j.cose.2021.102580_bib0004 article-title: A taxonomy of virtualization security issues in cloud computing environments publication-title: Indian Journal of Science and Technology doi: 10.17485/ijst/2019/v12i3/139557 – start-page: 218 year: 2013 ident: 10.1016/j.cose.2021.102580_bib0040 article-title: VULCAN: vulnerability assessment framework for cloud computing – volume: 11 start-page: 683 issue: 4 year: 2019 ident: 10.1016/j.cose.2021.102580_bib0072 article-title: Security concerns and countermeasures in cloud computing: a qualitative analysis publication-title: International Journal of Information Technology doi: 10.1007/s41870-018-0108-1 – start-page: 148 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0026 article-title: Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS – start-page: 3 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0014 article-title: Introduction – start-page: 59 year: 2014 ident: 10.1016/j.cose.2021.102580_bib0045 article-title: A survey of common security vulnerabilities and corresponding countermeasures for saas – volume: 48 start-page: 10:1 issue: 1 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0013 article-title: A survey on hypervisor-based monitoring: approaches, applications, and evolutions publication-title: ACM Comput. Surv. doi: 10.1145/2775111 – year: 2020 ident: 10.1016/j.cose.2021.102580_bib0025 article-title: Flexera 2020 state of the cloud report publication-title: Applied Computing and Informatics – volume: 117 start-page: 38 year: 2019 ident: 10.1016/j.cose.2021.102580_bib0052 article-title: Determinants of software-as-a-service benefits and impact on firm performance publication-title: Decis. Support Syst. doi: 10.1016/j.dss.2018.12.005 – volume: 19 start-page: 242 issue: 3 year: 2014 ident: 10.1016/j.cose.2021.102580_bib0061 article-title: Cloud computing publication-title: Resonance doi: 10.1007/s12045-014-0030-1 – start-page: 63 year: 2020 ident: 10.1016/j.cose.2021.102580_bib0069 article-title: Security issues in cloud computing – volume: 76 start-page: 9493 issue: 12 year: 2020 ident: 10.1016/j.cose.2021.102580_bib0075 article-title: A survey on security challenges in cloud computing: issues, threats, and solutions publication-title: J. Supercomput. doi: 10.1007/s11227-020-03213-1 – volume: 9 issue: 3 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0051 article-title: A survey of security and privacy challenges in cloud computing: solutions and future directions publication-title: J. Comput. Sci. Eng. doi: 10.5626/JCSE.2015.9.3.119 – year: 2017 ident: 10.1016/j.cose.2021.102580_sbref0078 – volume: 49 start-page: 202 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0022 article-title: Understanding ddos attack & its effect in cloud environment publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2015.04.245 – volume: 28 start-page: 583 issue: 3 year: 2012 ident: 10.1016/j.cose.2021.102580_bib0086 article-title: Addressing cloud computing security issues publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2010.12.006 – start-page: 347 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0012 article-title: Cloud computing security challenges & solutions-a survey – ident: 10.1016/j.cose.2021.102580_bib0037 – volume: 2 issue: 1 year: 2012 ident: 10.1016/j.cose.2021.102580_bib0007 article-title: Cloud computing security issues in infrastructure as a service publication-title: International journal of advanced research in computer science and software engineering – volume: 91 start-page: 93 issue: 1 year: 2011 ident: 10.1016/j.cose.2021.102580_bib0077 article-title: Locking the sky: a survey on iaas cloud security publication-title: Computing doi: 10.1007/s00607-010-0140-x – volume: 13 start-page: 113 issue: 2 year: 2014 ident: 10.1016/j.cose.2021.102580_bib0024 article-title: Security issues in cloud environments: a survey publication-title: Int. J. Inf. Sec. doi: 10.1007/s10207-013-0208-7 – start-page: 524 year: 2011 ident: 10.1016/j.cose.2021.102580_bib0068 article-title: Cloud computing security-trends and research directions – volume: 71 start-page: 11 year: 2016 ident: 10.1016/j.cose.2021.102580_bib0043 article-title: A survey of security issues for cloud computing publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.05.010 – volume: 63 start-page: 561 issue: 2 year: 2013 ident: 10.1016/j.cose.2021.102580_bib0057 article-title: A survey on security issues and solutions at different layers of cloud computing publication-title: J. Supercomput. doi: 10.1007/s11227-012-0831-5 – volume: 59 start-page: 126 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0021 article-title: Cloud security: emerging threats and current solutions publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2016.03.004 – start-page: 2843 year: 2010 ident: 10.1016/j.cose.2021.102580_bib0050 article-title: A trusted computing environment model in cloud architecture – volume: 79 start-page: 88 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0071 article-title: Cloud security issues and challenges: a survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.11.027 – volume: 75 start-page: 200 year: 2016 ident: 10.1016/j.cose.2021.102580_bib0073 article-title: A survey on cloud computing security: issues, threats, and solutions publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.09.002 – start-page: 516 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0041 article-title: Performance evaluation of aws and ibm cloud platforms for security mechanism – volume: 56 start-page: 30 issue: 2 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0084 article-title: A multi-level ddos mitigation framework for the industrial internet of things publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2018.1700621 – volume: 5 start-page: 523 issue: 3 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0029 article-title: Cloud-trust - a security assessment model for infrastructure as a service (iaas) clouds publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2015.2415794 – start-page: 117 year: 2016 ident: 10.1016/j.cose.2021.102580_bib0039 article-title: Analysis of cloud computing attacks and countermeasures – volume: 305 start-page: 357 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0002 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. doi: 10.1016/j.ins.2015.01.025 – volume: 67 start-page: 206 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0047 article-title: Towards a security-enhanced paas platform for multi-cloud applications publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.10.008 – volume: 151 start-page: 68 year: 2019 ident: 10.1016/j.cose.2021.102580_bib0008 article-title: Security in hardware assisted virtualization for cloud computing - state of the art issues and challenges publication-title: Comput. Networks doi: 10.1016/j.comnet.2019.01.013 – volume: 2 start-page: 29 issue: 1 year: 2020 ident: 10.1016/j.cose.2021.102580_bib0065 article-title: Security threats in cloud computing: trend and challenges publication-title: International Journal of Computing and Communication Networks – start-page: 285 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0060 article-title: Paas - black or white: an investigation into software development model for building retail industry saas – year: 2016 ident: 10.1016/j.cose.2021.102580_sbref0003 – start-page: 434 year: 2014 ident: 10.1016/j.cose.2021.102580_bib0032 article-title: Dynamically changing service level agreements (slas) management in cloud computing – volume: 47 start-page: 68:1 issue: 4 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0035 article-title: The state of public infrastructure-as-a-service cloud security publication-title: ACM Comput. Surv. doi: 10.1145/2767181 – volume: 975 start-page: 8887 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0076 article-title: Implementation of cloud computing service delivery models (IaaS, PaaS) by aws and microsoft azure: a survey publication-title: Int J Comput Appl – volume: 2018 start-page: 1681908:1 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0011 article-title: Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures publication-title: Secur. Commun. Networks – volume: 41 start-page: 424 year: 2014 ident: 10.1016/j.cose.2021.102580_bib0055 article-title: Resource management for infrastructure as a service (iaas) in cloud computing: a survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2013.10.004 – start-page: 594 year: 2011 ident: 10.1016/j.cose.2021.102580_bib0015 article-title: NIST cloud computing reference architecture – year: 2020 ident: 10.1016/j.cose.2021.102580_sbref0049 – year: 2019 ident: 10.1016/j.cose.2021.102580_bib0027 – volume: 178 start-page: 443 year: 2017 ident: 10.1016/j.cose.2021.102580_bib0079 article-title: Cloud computing: business perspectives, benefits and challenges for small and medium enterprises (case of latvia) publication-title: Procedia Eng doi: 10.1016/j.proeng.2017.01.087 – volume: 34 start-page: 1 issue: 1 year: 2011 ident: 10.1016/j.cose.2021.102580_bib0074 article-title: A survey on security issues in service delivery models of cloud computing publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2010.07.006 – volume: 10 start-page: 32 issue: 3 year: 2019 ident: 10.1016/j.cose.2021.102580_bib0031 article-title: A comprehensive survey on privacy and security issues in cloud computing, internet of things and cloud of things publication-title: Int. J. Serv. Sci. Manag. Eng. Technol. – start-page: 513 year: 2021 ident: 10.1016/j.cose.2021.102580_bib0059 article-title: A survey on cloud computing security issues, attacks and countermeasures – volume: 33 start-page: 1 year: 2019 ident: 10.1016/j.cose.2021.102580_bib0048 article-title: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2019.05.002 – year: 2018 ident: 10.1016/j.cose.2021.102580_bib0056 article-title: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations (2nd Draft) – volume: 4 start-page: 5:1 issue: 1 year: 2013 ident: 10.1016/j.cose.2021.102580_bib0033 article-title: An analysis of security issues for cloud computing publication-title: J. Internet Serv. Appl. doi: 10.1186/1869-0238-4-5 – volume: 9 issue: 2 year: 2018 ident: 10.1016/j.cose.2021.102580_bib0054 article-title: Cloud computing-technologies publication-title: International Journal of Advanced Research in Computer Science doi: 10.26483/ijarcs.v9i2.5760 – volume: 48 start-page: 347 year: 2015 ident: 10.1016/j.cose.2021.102580_bib0067 article-title: A review on cloud data security and its mitigation techniques publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2015.04.192 |
| SSID | ssj0017688 |
| Score | 2.6467364 |
| Snippet | Cloud computing has recently attracted significant attention due to its economical and high-quality services. In the last decade, cloud services have... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 102580 |
| SubjectTerms | Business Classification Cloud computing Companies Cybersecurity IaaS Migration Outsourcing PaaS Polls & surveys SaaS Security Service-based cloud computing Services Taxonomy |
| Title | Cloud computing security: A survey of service-based models |
| URI | https://dx.doi.org/10.1016/j.cose.2021.102580 https://www.proquest.com/docview/2639038928 |
| Volume | 114 |
| WOSCitedRecordID | wos000754417100006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLfKhhCXAYOJwUA5sFOVqnYcx9mtGq0YTAWpnVROlpM4areSdk1bTTvzh_Mcx0k7QQUHLlGUD7fy--X59_y-EPog0zBlKpEu5lK6NJWhy5lkLgtxGMQpVYyYZhNBv89Ho_Bbo_HT5sKsp0GW8bu7cP5fRQ3XQNg6dfYfxF0NChfgHIQORxA7HP9K8OfT2apIVZuvipDmvOxQZ3LQ89VirQqvem60hKvXscR0xMk3qart95AX6LCj1C6nhTTpIj1gqz_UuPllPKut-wGY-mO5Lh36WZJNagfIjcHgQKl6TfiubgyNBU04yWG0i3s42dySAGu2isky-2Q2V2agbleziWwOWp3NLUxdab1t6mu2lFG7PCAuI22-pZcx3dCs-Lf63mw9XLd0cD8Y-wTrUhS-6Q21XVy7_1X0ri4vxbA7Gp56vfmtqzuPaQ_9qffRoOAR2ieBH4Ju3O9cdEefK28UmGS8qhEP_7xMvjJxgg9_-k8E58FSX_CX4XN0UBoeTscA5gVqqOwQPbF5D4fomZW3U6r7l-isgJJTQcmxIDhzOo4BkjNLnS0gOQZIr9BVrzs8_-SWvTbc2CN86ZJAtSmTtJ2QhOIklkwqP5WMJ4xHhEYBCxUQm0jSiCns0XYEdrT0aah4ILEfe0doL5tl6jVysPISLwixnxCPylhXpEyBWHOa0hTYrDpG2E6QiMtC9LofylTYiMNroSdV6EkVZlKPUbN6Z27KsOx82rfzLkoiaQiiANzsfO_ECkmUX3QuCHB4XYWS8De7b79FT-uP4QTtLRcr9Q49jtfLSb54X2LqF0rumS0 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cloud+computing+security%3A+A+survey+of+service-based+models&rft.jtitle=Computers+%26+security&rft.au=Parast%2C+Fatemeh+Khoda&rft.au=Sindhav%2C+Chandni&rft.au=Nikam%2C+Seema&rft.au=Yekta%2C+Hadiseh+Izadi&rft.date=2022-03-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=114&rft.spage=1&rft_id=info:doi/10.1016%2Fj.cose.2021.102580&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |