Visible to the public A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation

TitleA Survey on Security of Cloud Environment: Threats, Solutions, and Innovation
Publication TypeConference Paper
Year of Publication2018
AuthorsZhang, J., Zheng, L., Gong, L., Gu, Z.
Conference Name2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)
Keywordsattack taxonomy, behavior analysis, block chain technology, cloud computing, cloud computing environment, cloud introspection, Cloud Security, CloudI, CloudVMI, compositionality, data mining, data mining techniques, expandability, intrusion detection techniques, machine learning, malicious behavior detection, Malware, misuse detection techniques, Monitoring, pubcrawl, resilience, Resiliency, security, security of data, tenant network, virtual machine introspection techniques, virtual machine monitor, Virtual machine monitors, virtual machines, Virtual machining, VMI

With the extensive application of cloud computing technology developing, security is of paramount importance in Cloud Computing. In the cloud computing environment, surveys have been provided on several intrusion detection techniques for detecting intrusions. We will summarize some literature surveys of various attack taxonomy, which might cause various threats in cloud environment. Such as attacks in virtual machines, attacks on virtual machine monitor, and attacks in tenant network. Besides, we review massive existing solutions proposed in the literature, such as misuse detection techniques, behavior analysis of network traffic, behavior analysis of programs, virtual machine introspection (VMI) techniques, etc. In addition, we have summarized some innovations in the field of cloud security, such as CloudVMI, data mining techniques, artificial intelligence, and block chain technology, etc. At the same time, our team designed and implemented the prototype system of CloudI (Cloud Introspection). CloudI has characteristics of high security, high performance, high expandability and multiple functions.

Citation Keyzhang_survey_2018