Locking the sky: a survey on IaaS cloud security

Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services’ time to market. Several concerns prevent players’ entry in the cloud; security is argua...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computing 2011, Vol.91 (1), p.93-118
Hauptverfasser: Vaquero, Luis M., Rodero-Merino, Luis, Morán, Daniel
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 118
container_issue 1
container_start_page 93
container_title Computing
container_volume 91
creator Vaquero, Luis M.
Rodero-Merino, Luis
Morán, Daniel
description Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services’ time to market. Several concerns prevent players’ entry in the cloud; security is arguably the most relevant one. Many factors have an impact on cloud security, but it is its multitenant nature that brings the newest and more challenging problems to cloud settings. Here, we analyze the security risks that multitenancy induces to the most established clouds, Infrastructure as a service clouds, and review the literature available to present the most relevant threats, state of the art of solutions that address some of the associated risks. A major conclusion of our analysis is that most reported systems employ access control and encryption techniques to secure the different elements present in a virtualized (multitenant) datacenter. Also, we analyze which are the open issues and challenges to be addressed by cloud systems in the security field.
doi_str_mv 10.1007/s00607-010-0140-x
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_861535592</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2238685401</sourcerecordid><originalsourceid>FETCH-LOGICAL-c347t-1033ce7bc4ea32a2f83cc6b578d71cae9476f6382decbc5d81815dc663b87cd03</originalsourceid><addsrcrecordid>eNp1kE1Lw0AQhhdRsFZ_gLfFi6fobDb7UW8ifhQKHlTwtmwmm5o2TepuIs2_d0sEQfAwzGGe92V4CDlncMUA1HUAkKASYBAng2R3QCYs4zIRINQhmcD-kmnxfkxOQlgBQMr1bEJg0eK6apa0-3A0rIcbamno_ZcbaNvQubUvFOu2L2hw2PuqG07JUWnr4M5-9pS8Pdy_3j0li-fH-d3tIkGeqS5hwDk6lWPmLE9tWmqOKHOhdKEYWjfLlCwl12nhMEdRaKaZKFBKnmuFBfApuRx7t7797F3ozKYK6OraNq7tg9GSCS7ELI3kxR9y1fa-ic8ZnQFo4CAixEYIfRuCd6XZ-mpj_WAYmL1BMxo00ZPZGzS7mEnHTIhss3T-t_j_0Del8XI2</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>840080305</pqid></control><display><type>article</type><title>Locking the sky: a survey on IaaS cloud security</title><source>Business Source Complete</source><source>SpringerLink Journals - AutoHoldings</source><creator>Vaquero, Luis M. ; Rodero-Merino, Luis ; Morán, Daniel</creator><creatorcontrib>Vaquero, Luis M. ; Rodero-Merino, Luis ; Morán, Daniel</creatorcontrib><description>Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services’ time to market. Several concerns prevent players’ entry in the cloud; security is arguably the most relevant one. Many factors have an impact on cloud security, but it is its multitenant nature that brings the newest and more challenging problems to cloud settings. Here, we analyze the security risks that multitenancy induces to the most established clouds, Infrastructure as a service clouds, and review the literature available to present the most relevant threats, state of the art of solutions that address some of the associated risks. A major conclusion of our analysis is that most reported systems employ access control and encryption techniques to secure the different elements present in a virtualized (multitenant) datacenter. Also, we analyze which are the open issues and challenges to be addressed by cloud systems in the security field.</description><identifier>ISSN: 0010-485X</identifier><identifier>EISSN: 1436-5057</identifier><identifier>DOI: 10.1007/s00607-010-0140-x</identifier><language>eng</language><publisher>Vienna: Springer Vienna</publisher><subject>Access control ; Artificial Intelligence ; Cloud computing ; Clouds ; Computer Appl. in Administrative Data Processing ; Computer Communication Networks ; Computer Science ; Computing costs ; Computing time ; Information Systems Applications (incl.Internet) ; Infrastructure ; Markets ; Mathematical analysis ; Mathematical models ; Network security ; Risk ; Security ; Software Engineering ; Software services ; Studies ; Threats</subject><ispartof>Computing, 2011, Vol.91 (1), p.93-118</ispartof><rights>Springer-Verlag 2010</rights><rights>Springer-Verlag 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c347t-1033ce7bc4ea32a2f83cc6b578d71cae9476f6382decbc5d81815dc663b87cd03</citedby><cites>FETCH-LOGICAL-c347t-1033ce7bc4ea32a2f83cc6b578d71cae9476f6382decbc5d81815dc663b87cd03</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00607-010-0140-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00607-010-0140-x$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Vaquero, Luis M.</creatorcontrib><creatorcontrib>Rodero-Merino, Luis</creatorcontrib><creatorcontrib>Morán, Daniel</creatorcontrib><title>Locking the sky: a survey on IaaS cloud security</title><title>Computing</title><addtitle>Computing</addtitle><description>Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services’ time to market. Several concerns prevent players’ entry in the cloud; security is arguably the most relevant one. Many factors have an impact on cloud security, but it is its multitenant nature that brings the newest and more challenging problems to cloud settings. Here, we analyze the security risks that multitenancy induces to the most established clouds, Infrastructure as a service clouds, and review the literature available to present the most relevant threats, state of the art of solutions that address some of the associated risks. A major conclusion of our analysis is that most reported systems employ access control and encryption techniques to secure the different elements present in a virtualized (multitenant) datacenter. Also, we analyze which are the open issues and challenges to be addressed by cloud systems in the security field.</description><subject>Access control</subject><subject>Artificial Intelligence</subject><subject>Cloud computing</subject><subject>Clouds</subject><subject>Computer Appl. in Administrative Data Processing</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computing costs</subject><subject>Computing time</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Infrastructure</subject><subject>Markets</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><subject>Network security</subject><subject>Risk</subject><subject>Security</subject><subject>Software Engineering</subject><subject>Software services</subject><subject>Studies</subject><subject>Threats</subject><issn>0010-485X</issn><issn>1436-5057</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kE1Lw0AQhhdRsFZ_gLfFi6fobDb7UW8ifhQKHlTwtmwmm5o2TepuIs2_d0sEQfAwzGGe92V4CDlncMUA1HUAkKASYBAng2R3QCYs4zIRINQhmcD-kmnxfkxOQlgBQMr1bEJg0eK6apa0-3A0rIcbamno_ZcbaNvQubUvFOu2L2hw2PuqG07JUWnr4M5-9pS8Pdy_3j0li-fH-d3tIkGeqS5hwDk6lWPmLE9tWmqOKHOhdKEYWjfLlCwl12nhMEdRaKaZKFBKnmuFBfApuRx7t7797F3ozKYK6OraNq7tg9GSCS7ELI3kxR9y1fa-ic8ZnQFo4CAixEYIfRuCd6XZ-mpj_WAYmL1BMxo00ZPZGzS7mEnHTIhss3T-t_j_0Del8XI2</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>Vaquero, Luis M.</creator><creator>Rodero-Merino, Luis</creator><creator>Morán, Daniel</creator><general>Springer Vienna</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L.0</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>2011</creationdate><title>Locking the sky: a survey on IaaS cloud security</title><author>Vaquero, Luis M. ; Rodero-Merino, Luis ; Morán, Daniel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c347t-1033ce7bc4ea32a2f83cc6b578d71cae9476f6382decbc5d81815dc663b87cd03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Access control</topic><topic>Artificial Intelligence</topic><topic>Cloud computing</topic><topic>Clouds</topic><topic>Computer Appl. in Administrative Data Processing</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computing costs</topic><topic>Computing time</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Infrastructure</topic><topic>Markets</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><topic>Network security</topic><topic>Risk</topic><topic>Security</topic><topic>Software Engineering</topic><topic>Software services</topic><topic>Studies</topic><topic>Threats</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vaquero, Luis M.</creatorcontrib><creatorcontrib>Rodero-Merino, Luis</creatorcontrib><creatorcontrib>Morán, Daniel</creatorcontrib><collection>CrossRef</collection><collection>Global News &amp; ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vaquero, Luis M.</au><au>Rodero-Merino, Luis</au><au>Morán, Daniel</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Locking the sky: a survey on IaaS cloud security</atitle><jtitle>Computing</jtitle><stitle>Computing</stitle><date>2011</date><risdate>2011</risdate><volume>91</volume><issue>1</issue><spage>93</spage><epage>118</epage><pages>93-118</pages><issn>0010-485X</issn><eissn>1436-5057</eissn><abstract>Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services’ time to market. Several concerns prevent players’ entry in the cloud; security is arguably the most relevant one. Many factors have an impact on cloud security, but it is its multitenant nature that brings the newest and more challenging problems to cloud settings. Here, we analyze the security risks that multitenancy induces to the most established clouds, Infrastructure as a service clouds, and review the literature available to present the most relevant threats, state of the art of solutions that address some of the associated risks. A major conclusion of our analysis is that most reported systems employ access control and encryption techniques to secure the different elements present in a virtualized (multitenant) datacenter. Also, we analyze which are the open issues and challenges to be addressed by cloud systems in the security field.</abstract><cop>Vienna</cop><pub>Springer Vienna</pub><doi>10.1007/s00607-010-0140-x</doi><tpages>26</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0010-485X
ispartof Computing, 2011, Vol.91 (1), p.93-118
issn 0010-485X
1436-5057
language eng
recordid cdi_proquest_miscellaneous_861535592
source Business Source Complete; SpringerLink Journals - AutoHoldings
subjects Access control
Artificial Intelligence
Cloud computing
Clouds
Computer Appl. in Administrative Data Processing
Computer Communication Networks
Computer Science
Computing costs
Computing time
Information Systems Applications (incl.Internet)
Infrastructure
Markets
Mathematical analysis
Mathematical models
Network security
Risk
Security
Software Engineering
Software services
Studies
Threats
title Locking the sky: a survey on IaaS cloud security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T11%3A36%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Locking%20the%20sky:%20a%20survey%20on%20IaaS%20cloud%20security&rft.jtitle=Computing&rft.au=Vaquero,%20Luis%20M.&rft.date=2011&rft.volume=91&rft.issue=1&rft.spage=93&rft.epage=118&rft.pages=93-118&rft.issn=0010-485X&rft.eissn=1436-5057&rft_id=info:doi/10.1007/s00607-010-0140-x&rft_dat=%3Cproquest_cross%3E2238685401%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=840080305&rft_id=info:pmid/&rfr_iscdi=true