Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Multilevel classification of security concerns in cloud computing
COMSATS Institute of Information Technology, PAK.
COMSATS Institute of Information Technology, PAK.
Lancaster University, GBR.
COMSATS Institute of Information Technology, PAK.
Show others and affiliations
2017 (English)In: Applied Computing and Informatics, E-ISSN 2210-8327, Vol. 13, no 1, p. 57-65Article in journal (Refereed) Published
Abstract [en]

Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers. This paper presents a novel multilevel classification model of different security attacks across different cloud services at each layer. It also identifies attack types and risk levels associated with different cloud services at these layers. The risks are ranked as low, medium and high. The intensity of these risk levels depends upon the position of cloud layers. The attacks get more severe for lower layers where infrastructure and platform are involved. The intensity of these risk levels is also associated with security requirements of data encryption, multi-tenancy, data privacy, authentication and authorization for different cloud services. The multilevel classification model leads to the provision of dynamic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider. © 2016 King Saud University

Place, publisher, year, edition, pages
Elsevier B.V. , 2017. Vol. 13, no 1, p. 57-65
Keywords [en]
Cloud computing, IaaS, PaaS, SaaS, Security, Virtualization
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-16546DOI: 10.1016/j.aci.2016.03.001Scopus ID: 2-s2.0-85047871495OAI: oai:DiVA.org:bth-16546DiVA, id: diva2:1220091
Note

open access

Available from: 2018-06-18 Created: 2018-06-18 Last updated: 2023-06-28Bibliographically approved

Open Access in DiVA

fulltext(811 kB)343 downloads
File information
File name FULLTEXT01.pdfFile size 811 kBChecksum SHA-512
d59d8b6a490b639dc8e9c924dc23ec75c34d49dc1301fdbecc1ad9a7183b724731d7fe6b79763111261c5b1cef1043c5876b40aed04432b371f1c9d0d083e058
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Shahzad, Raja Khurram

Search in DiVA

By author/editor
Shahzad, Raja Khurram
By organisation
Department of Computer Science and Engineering
In the same journal
Applied Computing and Informatics
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 343 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 424 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf