A4 Vertaisarvioitu artikkeli konferenssijulkaisussa
Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey
Tekijät: Shohreh Hosseinzadeh, Sami Hyrynsalmi, Mauro Conti, and Ville Leppänen
Konferenssin vakiintunut nimi: IEEE International Conference on Cloud Computing Technology and Science
Julkaisuvuosi: 2015
Kokoomateoksen nimi: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
Aloitussivu: 529
Lopetussivu: 535
Sivujen määrä: 7
ISBN: 978-1-4673-9560-1
ISSN: 2330-2194
DOI: https://doi.org/10.1109/CloudCom.2015.29
The development of cloud computing has facilitate the organizations with its services. This makes the security and privacy of the cloud even more significant.
Diversification and obfuscation approaches are of the most promising proactive techniques that protect computers from harmful malware, by preventing them to take advantage of the security vulnerabilities. There is a large body of research on the use of diversification and obfuscation techniques for improving the security in various domains, including cloud computing. Cloud computing provides an excellent setting for applying diversification/obfuscation, as the computing platforms (virtual machines) are implemented in software.
The main objective of this study is to determine in what ways obfuscation and diversification techniques are used to enhance the security and privacy of the cloud computing, and discover the potential avenues for the further research. To achieve this goal, we systematically review and report the papers that discuss/propose a technique to enhance the security and privacy of the cloud, using diversification and obfuscation techniques. As the result of the search we collected 43 papers published on the topic. In this report we present the process of data collection, analysis of the results, and classification of the related studies. The classification is done based on how the diversification/obfuscation techniques are used to enhance the security in cloud computing environment. The presented study gives a clear view of the state of the art of the existing works in the field, and sheds light on the areas remained intact which could be avenues for further research. The existing works cover surprisingly a small set of the wealth of opportunities for diversification/obfuscation.
Ladattava julkaisu This is an electronic reprint of the original article. |