A Security-Based Survey and Classification of Cloud Architectures, State of Art and Future Directions

This research paper aims to explore the underlying cloud computing architectures with respect to security and auditing services. As most of the standards have not been defined yet for cloud computing, academic and industrial researchers are participating with their ideas and proofs. We have surveyed and classified the available cloud computing architectures into three categories which are 1) Architecture of Cloud Computing Security and Auditing, 2) Data Storage Security, Privacy and Auditing of Data Leakage, and 3) Security and Auditing of Malicious Acts. This taxonomy and analysis of existing cloud architectures will be helpful to address the primary issues focusing the security and auditing perspectives in future research.

[1]  Rusli Abdullah,et al.  Security framework of cloud data storage based on Multi Agent system architecture - A pilot study , 2012, 2012 International Conference on Information Retrieval & Knowledge Management.

[2]  Benny Rochwerger,et al.  A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[3]  A. B. M. Shawkat Ali,et al.  Trust Issues that Create Threats for Cyber Attacks in Cloud Computing , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[4]  Martin Knahl,et al.  Validating Cloud Infrastructure Changes by Cloud Audits , 2012, 2012 IEEE Eighth World Congress on Services.

[5]  Rose F. Gamble,et al.  A Tiered Strategy for Auditing in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[6]  William R. Claycomb,et al.  Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[7]  Dimitrios Katsaros,et al.  Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.

[8]  A. Waqas,et al.  Fault tolerant cloud auditing , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).

[9]  P. Ramachandra Rao,et al.  Efficient Audit Service Outsourcing for Data Integrity in Clouds , 2013 .

[10]  Jin Tong,et al.  NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292) , 2012 .

[11]  K. Sankar,et al.  On-Demand Security Architecture for Cloud Computing , 2014 .

[12]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[13]  Sadie Creese,et al.  Insider Attacks in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[15]  V. T. Kamble,et al.  Ensuring Distributed Accountability for Data Sharing in the Cloud , 2014 .

[16]  Bu-Sung Lee,et al.  Tracking of Data Leaving the Cloud , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.