A4 Refereed article in a conference publication

Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey




AuthorsShohreh Hosseinzadeh, Sami Hyrynsalmi, Mauro Conti, and Ville Leppänen

Conference nameIEEE International Conference on Cloud Computing Technology and Science

Publication year2015

Book title 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)

First page 529

Last page535

Number of pages7

ISBN978-1-4673-9560-1

ISSN2330-2194

DOIhttps://doi.org/10.1109/CloudCom.2015.29


Abstract

The development of cloud computing has facilitate the organizations with its services. This makes the security and privacy of the cloud even more significant.

Diversification and obfuscation approaches are of the most promising proactive techniques that protect computers from harmful malware, by preventing them to take advantage of the security vulnerabilities. There is a large body of research on the use of diversification and obfuscation techniques for improving the security in various domains, including cloud computing. Cloud computing provides an excellent setting for applying diversification/obfuscation, as the computing platforms (virtual machines) are implemented in software.

The main objective of this study is to determine in what ways obfuscation and diversification techniques are used to enhance the security and privacy of the cloud computing, and discover the potential avenues for the further research. To achieve this goal, we systematically review and report the papers that discuss/propose a technique to enhance the security and privacy of the cloud, using diversification and obfuscation techniques. As the result of the search we collected 43 papers published on the topic. In this report we present the process of data collection, analysis of the results, and classification of the related studies. The classification is done based on how the diversification/obfuscation techniques are used to enhance the security in cloud computing environment. The presented study gives a clear view of the state of the art of the existing works in the field, and sheds light on the areas remained intact which could be avenues for further research. The existing works cover surprisingly a small set of the wealth of opportunities for diversification/obfuscation.


Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 23:22