Cloud Security Issues Based on People, Process and Technology Model: A Survey

Combination of utility computing and World Wide Web is base of the cloud computing. The intrinsic features of cloud computing have produced many competitive and computing benefits. The development of cloud computing and the expansion of service providers in this area has led to increase in investment in cloud computing. Large number of users on the one hand and increasing the number of sensitive data on cloud environments on the other hand, caused a dramatic growth in the motivation of malicious activities and as a result of security challenges. Solving the cloud computing security challenges need to proper knowledge of the security issues and the scope of their resolution. Security is a long-term product of interaction between people, process and technology. This categorization is based on possible solutions to security issues. Thus, the division of threats in these three areas can help the managers and security sectors to solve the security problems. Hence, in this paper, along with the comprehensive identification of cyber security challenges, we try to address these threats to categories of people, process, and technologies, in order to find cost effective, efficient and feasible security solutions based on this basis.

[1]  Nikolay Borissov,et al.  Cloud Computing – A Classification, Business Models, and Research Directions , 2009, Bus. Inf. Syst. Eng..

[2]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[3]  Hao Li,et al.  A novel security media cloud framework , 2019, Comput. Electr. Eng..

[4]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[5]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[6]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[7]  Hossein Gharaee,et al.  Security considerations and requirements for Cloud computing , 2016, 2016 8th International Symposium on Telecommunications (IST).

[8]  Mohsin Iftikhar,et al.  A Comprehensive Survey on Security in Cloud Computing , 2017, FNC/MobiSPC.

[9]  Richard Kemp Legal aspects of cloud security , 2018, Comput. Law Secur. Rev..

[10]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[11]  Subhajyoti Bandyopadhyay,et al.  Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.

[12]  Amanda Andress,et al.  Surviving Security: How to Integrate People, Process, and Technology, Second Edition , 2001 .

[13]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[14]  William W. Cooper,et al.  New Perspectives in Organization Research , 1965 .

[15]  P. Herbert Raj,et al.  Exploring Data Security Issues and Solutions in Cloud Computing , 2018 .

[16]  Pierangela Samarati,et al.  Cloud Security: Issues and Concerns , 2016 .

[17]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[18]  Steve Purser A practical guide to managing information security , 2004 .

[19]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[20]  Andrews Jeyaraj,et al.  Recent security challenges in cloud computing , 2018, Comput. Electr. Eng..

[21]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[22]  M. Theoharidou,et al.  Privacy risks , security and accountability in the Cloud , 2013 .

[23]  Kakali Chatterjee,et al.  Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..

[24]  Richard J. Enbody,et al.  Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.

[25]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.