{"title":"云计算安全分类与分类法:全面研究与比较","authors":"Najat Tissir, S. E. Kafhali, N. Aboutabit","doi":"10.1109/CloudTech49835.2020.9365884","DOIUrl":null,"url":null,"abstract":"Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud’s attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cloud Computing security classifications and taxonomies: a comprehensive study and comparison\",\"authors\":\"Najat Tissir, S. E. Kafhali, N. Aboutabit\",\"doi\":\"10.1109/CloudTech49835.2020.9365884\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud’s attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.\",\"PeriodicalId\":272860,\"journal\":{\"name\":\"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)\",\"volume\":\"110 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CloudTech49835.2020.9365884\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CloudTech49835.2020.9365884","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud Computing security classifications and taxonomies: a comprehensive study and comparison
Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud’s attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.