Research paper PMO
Research paper PMO
Research paper PMO
Cloud-based business opportunities have witnessed an expo- nential growth in the last ten
years and are expected to grow further with the emerging cloud-enabled applications of Big
Data, IoT, 5G, SDN and NFV [1]. In the cloud paradigm, a pool of computing resources
(hardware, CPU, storage, software, etc.) are managed by cloud service providers [2–4].
They offer their ser- vices in the form of infrastructure, platform, and software to its
consumers, mostly over the Internet using multi-tenancy and resource virtualization
techniques [5]. Cloud service deliv- ery model allows consumers to lease and release
computing resources through self-service interfaces with the pay-as-you-go model. The
unique characteristics of cloud, like pooled sharable resources, on-demand scalability,
customized self-service, ser- vices usage measurement, and broad accessibility, have
propelled the growth engine for cloud-based business use cases and ap- plication [5].
Gartner, a leading research and advisory company, in its report, has forecasted worldwide
public cloud services revenue to reach USD 411.4 billion in 2020 from USD 219.6 billion in
2016 [6]. The promising features of the cloud service delivery model, like no initial capital
investment, pay-per-use, accessibility, lowered operating expenses, fast deployment, rapid
provisioning, scalability, assured service continuity, low-cost dis- aster recovery, reduced
business risks and like others, resulted in its rapid deployment and its adoption by
enterprises [7–10].
The unprecedented growth of cloud-based applications and services have attracted research
communities, both from industry and academia, to find innovative solutions for more
consumer- friendly, cost-effective, technologically efficient and secured cloud systems. In
previous studies, security and privacy high- lighted as major challenge for accelerated
growth of cloud [11– 17]. Most of the security challenges are inherited from the vulner-
abilities in cloud architectural components and technologies used, like, vulnerabilities in
Internet communication, web services, service oriented architecture, web-browsers,
virtualization, hy- pervisors, multi-tenancy, software, virtual machines, self-service
management interfaces, etc. [18]. In cloud-based solutions, user’s data is stored and
managed remotely that creates fear in users for losing control of their data. So, most of the
recommended solutions in literature are around ensuring confidentiality, in- tegrity,
availability, authentication, authorization, accountability and privacy of user data by enforcing
the different mechanism of encryption, identity and access control, intrusion detection and
prevention, software testing and quality control, secured com- munications, secured virtual
machines and hypervisors, secured storage for user data life-cycle management, trust
establish- ment, auditing and logging of user activities along with com- pliance to service
level agreements (SLAs), legal and regulatory framework [19,20].
Table 1 presents a comparative study of the different works published during the year 2010
to 2019. The choice of years (2010–2019), for selection of published works, is inspired by
the phenomenal growth of cloud delivery model during these years [1]. The selected
published works are referenced in different related works on security and privacy in the
cloud. The choice of comparison criterion (Table 1) is based on different aspects of a cloud
system that are discussed in different published works. The main contribution of this survey
is to present an end-to- end mapping of cloud security requirements, identified threats,
known cloud system vulnerabilities and suggested countermea- sures using a unified
taxonomy of cloud security. Additionally, it provides cloud architectural components view,
used technologies and cloud model taxonomy. Trust-based solutions suggested by different
researchers, to address cloud requirements, are also discussed. Further, this work includes
an overview of the impact on the emerging cloud-enabled applications of Big Data, IoT, 5G,
SDN and NFV due to cloud security and privacy issues.
In subsequent sections, Section 2 analyzes related work in cloud security and privacy. A
brief understanding of the cloud computing paradigm is provided in Section 3. Section 4
presents a unified cloud security taxonomy and describes cloud security requirements,
identified threats, vulnerabilities in the cloud ar- chitectural components and technologies
along with suggested countermeasures in different published works. Section 5 pro- vides
inter-related analysis and mappings of countermeasures for identified security requirements,
threats and vulnerabilities. It presents an approach for selection and prioritization of coun-
termeasures. It also highlights security aspects of cloud-enabled emerging applications.
Section 6 provides a conclusion and ex- plores further research possibilities for trust-based
adaptive se- curity and privacy solution for cloud systems.
SUMMERIZE
Introduction:
The document begins by addressing the rapid growth of cloud-based applications and
services, which has spurred both industry and academia to seek innovative solutions for
systems. Despite the progress, security and privacy remain significant challenges due to
vulnerabilities inherent in cloud architecture and technologies. This has led to concerns over
user data control and the push for various security mechanisms to ensure data
Conclusion:
The conclusion of the paper reiterates the significant challenges posed by security and
privacy issues in cloud computing, emphasizing the need for adaptive security solutions. It
notes the development and implementation of cloud security countermeasures as crucial for
architecture is essential for maintaining robust defense mechanisms against evolving threats
Future Directions:
The future research directions suggest focusing on adaptive security mechanisms that can
dynamically adjust to new threats in the cloud computing environment. This is particularly
relevant for emerging technologies like the Internet of Things (IoT), Big Data, 5G, Software
Defined Networking (SDN), and Network Function Virtualization (NFV). The document points
out the need for innovative security solutions that can evolve alongside these technologies,