Title :
Cloud computing: Security challenges
Author :
Bouayad, Anas ; Blilat, Asmae ; El Houda Mejhed, N. ; El Ghazi, Mohammed
Author_Institution :
LTTI Lab., Sidi Mohamed Ben Abdellah Univ., Fez, Morocco
Abstract :
Although cloud computing can help companies accomplish more by breaking the physical bonds between an IT infrastructure and its users, heightened security threats must be overcome in order to benefit fully from this new computing paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption. The security problem becomes more complicated under the cloud model as new dimensions have entered into the problem scope related to the model architecture, multi-tenancy, elasticity, and layers dependency stack. In this paper we introduce a detailed analysis of the cloud security problem. We investigated the problem from the cloud architecture perspective, the cloud offered characteristics perspective, the cloud stakeholders´ perspective, and the cloud service delivery models perspective. Based on this analysis we derive a detailed specification of the cloud security problem and key features that should be covered by any proposed security solution.
Keywords :
business data processing; cloud computing; information technology; organisational aspects; security of data; IT infrastructure; cloud architecture perspective; cloud computing; innovative business model; innovative business organizations; security challenges; security threats; Computational modeling; Computer architecture; Runtime; Security; cloud computing; cloud computing security; cloud computing security management;
Conference_Titel :
Information Science and Technology (CIST), 2012 Colloquium in
Conference_Location :
Fez
Print_ISBN :
978-1-4673-2726-8
Electronic_ISBN :
978-1-4673-2724-4
DOI :
10.1109/CIST.2012.6388058