Nothing Special   »   [go: up one dir, main page]

Open Access iconOpen Access

ARTICLE

crossmark

Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective

Mwaffaq Abu-Alhaija1, Nidal M. Turab1,*, AbdelRahman Hamza2

1 Department of Networks and Information Security, Faculty of Information Technology, Al-Ahliyya Amman University, Amman, 19328, Jordan
2 Department of Computer Science, Information Technology, Al-Ahliyya Amman University, Amman, 19328, Jordan

* Corresponding Author: Nidal M. Turab. Email: email

Computer Systems Science and Engineering 2022, 41(1), 225-240. https://doi.org/10.32604/csse.2022.019547

Abstract

Infrastructure as a Service (IaaS) provides logical separation between data, network, applications and machines from the physical constrains of real machines. IaaS is one of the basis of cloud virtualization. Recently, security issues are also gradually emerging with virtualization of cloud computing. Different security aspects of cloud virtualization will be explored in this research paper, security recognizing potential threats or attacks that exploit these vulnerabilities, and what security measures are used to alleviate such threats. In addition, a discussion of general security requirements and the existing security schemes is also provided. As shown in this paper, different components of virtualization environment are targets to various attacks that in turn leads to security issues compromising the whole cloud infrastructure. In this paper an overview of various cloud security aspects is also provided. Different attack scenarios of virtualization environments and security solutions to cater these attacks have been discussed in the paper. We then proceed to discuss API security concerns, data security, hijacking of user account and other security concerns. The aforementioned discussions can be used in the future to propose assessment criteria, which could be useful in analyzing the efficiency of security solutions of virtualization environment in the face of various virtual environment attacks.

Keywords


Cite This Article

APA Style
Abu-Alhaija, M., Turab, N.M., Hamza, A. (2022). Extensive study of cloud computing technologies, threats and solutions prospective. Computer Systems Science and Engineering, 41(1), 225-240. https://doi.org/10.32604/csse.2022.019547
Vancouver Style
Abu-Alhaija M, Turab NM, Hamza A. Extensive study of cloud computing technologies, threats and solutions prospective. Comput Syst Sci Eng. 2022;41(1):225-240 https://doi.org/10.32604/csse.2022.019547
IEEE Style
M. Abu-Alhaija, N.M. Turab, and A. Hamza, “Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective,” Comput. Syst. Sci. Eng., vol. 41, no. 1, pp. 225-240, 2022. https://doi.org/10.32604/csse.2022.019547



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2471

    View

  • 1384

    Download

  • 0

    Like

Share Link