MTHUNZI, Siyakha, BENKHELIFA, Elhadj, BOSAKOWSKI, Tomasz, Ghedira Guegan, Chirine and Barhamgi, Mahmoud (2019) Cloud computing security taxonomy: From an atomistic to a holistic view. Future Generation Computer Systems, 107. pp. 620-644. ISSN 0167-739X
FUTURE_atomistic_report.pdf - AUTHOR'S ACCEPTED Version (default)
Available under License Type Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0).
Download (2MB) | Preview
Abstract or description
Countless discussions around security challenges affecting cloud computing are often large textual accounts, which can be cumbersome to read and prone to misinterpretation. The growing reliance on cloud computing means that not only should we focus on evaluating its security challenges but devote greater attention towards how challenges are viewed and communicated. With many cloud computing implementations in use and a growing evolution of the cloud paradigm (including fog, edge and cloudlets), comprehending, correlating and classifying diverse perspectives to security challenges increasingly becomes critical. Current classifications are only suited for limited use; both as effective tools for research and countermeasures design. The taxonomic approach has been used as a modeling technique towards classifying concepts across many domains. This paper surveys multiple perspectives of cloud security challenges and systematically develops corresponding graphical taxonomy based upon meta-synthesis of important cloud security concepts in literature. The contributions and significance of this work are as follows: (1) a holistic view simplifies visualization for the reader by providing illustrative graphics of existing textual perspectives, highlighting entity relationships among cloud entities/players thereby exposing security areas at every layer of the cloud. (2) a holistic taxonomy that facilitates the design of enforcement or corrective countermeasures based upon the source or origin of a security incident. (3) a holistic taxonomy highlights security boundary and identifies apt areas to implement security countermeasures.
Item Type: | Article |
---|---|
Faculty: | School of Computing and Digital Technologies > Computing |
Depositing User: | Elhadj BENKHELIFA |
Date Deposited: | 06 Apr 2020 14:26 |
Last Modified: | 24 Feb 2023 13:58 |
URI: | https://eprints.staffs.ac.uk/id/eprint/6221 |