TY - JOUR
T1 - Locking the sky
T2 - A survey on IaaS cloud security
AU - Vaquero, Luis M.
AU - Rodero-Merino, Luis
AU - Morán, Daniel
PY - 2011/1/1
Y1 - 2011/1/1
N2 - Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services' time to market. Several concerns prevent players' entry in the cloud; security is arguably the most relevant one. Many factors have an impact on cloud security, but it is its multitenant nature that brings the newest and more challenging problems to cloud settings. Here, we analyze the security risks that multitenancy induces to the most established clouds, Infrastructure as a service clouds, and review the literature available to present the most relevant threats, state of the art of solutions that address some of the associated risks. A major conclusion of our analysis is that most reported systems employ access control and encryption techniques to secure the different elements present in a virtualized (multitenant) datacenter. Also, we analyze which are the open issues and challenges to be addressed by cloud systems in the security field.
AB - Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus reducing the overall costs and services' time to market. Several concerns prevent players' entry in the cloud; security is arguably the most relevant one. Many factors have an impact on cloud security, but it is its multitenant nature that brings the newest and more challenging problems to cloud settings. Here, we analyze the security risks that multitenancy induces to the most established clouds, Infrastructure as a service clouds, and review the literature available to present the most relevant threats, state of the art of solutions that address some of the associated risks. A major conclusion of our analysis is that most reported systems employ access control and encryption techniques to secure the different elements present in a virtualized (multitenant) datacenter. Also, we analyze which are the open issues and challenges to be addressed by cloud systems in the security field.
KW - Cloud computing
KW - IaaS
KW - Multitenancy
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=79751493181&partnerID=8YFLogxK
U2 - 10.1007/s00607-010-0140-x
DO - 10.1007/s00607-010-0140-x
M3 - Article (Academic Journal)
AN - SCOPUS:79751493181
SN - 0010-485X
VL - 91
SP - 93
EP - 118
JO - Computing (Vienna/New York)
JF - Computing (Vienna/New York)
IS - 1
ER -