Cloud security and privacy model for providing secure cloud services

Cloud computing is becoming increasingly a magical solution and a widely adopted technology for delivering services over the Internet thanks to its diverse benefits, including services on demand, reducing costs, sharing and configuring computing resources, and high services scalability and flexibility. However, with the emergence of this technology, the concept of security and privacy has become a major barrier to cloud services adoption. Indeed, many research works have been done to identify cloud security and privacy issues. It is in this context that in this paper, we will provide a new cloud security and privacy model (CSPM) into layers which can be taken into account by cloud providers during all the stages of cloud services building and monitoring. This model will permit to overcome this cloud services barrier adoption and thus, to build confidence in cloud services and also to provide secure services. Finally, we will present some security threats and attacks, and propose, according to CSPM, some countermeasures.

[1]  Shai Halevi,et al.  Homomorphic Encryption , 2017, Tutorials on the Foundations of Cryptography.

[2]  Nils Gruschka,et al.  Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[3]  Dimitris Gritzalis,et al.  The Insider Threat in Cloud Computing , 2011, CRITIS.

[4]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[5]  RajaniKanth Aluvalu,et al.  A Survey on Access Control Models in Cloud Computing , 2015 .

[6]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[7]  Gabriela Moise,et al.  A New Approach of the Cryptographic Attacks , 2011, DICTAP.

[8]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[9]  Dooho Choi,et al.  Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis , 2015 .

[10]  Issa M. Khalil,et al.  Cloud Computing Security: A Survey , 2014, Comput..