Loading…

From Security to Assurance in the Cloud: A Survey

The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tena...

Full description

Saved in:
Bibliographic Details
Published in:ACM computing surveys 2015-09, Vol.48 (1), p.1-50
Main Authors: Ardagna, Claudio A, Asal, Rasool, Damiani, Ernesto, Vu, Quang Hieu
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c248t-26423e069551ecef6cc3e44e06149252f72b037f1dec5d7fbf039e91de4635673
container_end_page 50
container_issue 1
container_start_page 1
container_title ACM computing surveys
container_volume 48
creator Ardagna, Claudio A
Asal, Rasool
Damiani, Ernesto
Vu, Quang Hieu
description The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and higher performance and flexibility, than traditional on-premises resources, without having to care about infrastructure management. Still, cloud tenants remain concerned with the cloud's level of service and the nonfunctional properties their applications can count on. In the last few years, the research community has been focusing on the nonfunctional aspects of the cloud paradigm, among which cloud security stands out. Several approaches to security have been described and summarized in general surveys on cloud security techniques. The survey in this article focuses on the interface between cloud security and cloud security assurance. First, we provide an overview of the state of the art on cloud security. Then, we introduce the notion of cloud security assurance and analyze its growing impact on cloud security approaches. Finally, we present some recommendations for the development of next-generation cloud security and assurance solutions.
doi_str_mv 10.1145/2767005
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1770306120</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1770306120</sourcerecordid><originalsourceid>FETCH-LOGICAL-c248t-26423e069551ecef6cc3e44e06149252f72b037f1dec5d7fbf039e91de4635673</originalsourceid><addsrcrecordid>eNpd0E1Lw0AQBuBFFKxV_AsBD_USndnP5liCVaHgQT2HdDOLKUm27iaH_nu3tCdPwwwPw8zL2D3CE6JUz9xoA6Au2AyVMrkREi_ZDISGHATANbuJcQcAXKKescU6-D77JDuFdjxko89WMU6hHixl7ZCNP5SVnZ-aW3bl6i7S3bnO2ff65at8yzcfr-_lapNbLpdjzrXkgkAXSiFZctpaQVKmCcqCK-4M34IwDhuyqjFu60AUVKRWaqG0EXP2eNq7D_53ojhWfRstdV09kJ9ihcakLzRySPThH935KQzpuqQ4FEbhEpNanJQNPsZArtqHtq_DoUKojoFV58DEH8utWQk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1720975181</pqid></control><display><type>article</type><title>From Security to Assurance in the Cloud: A Survey</title><source>Business Source Ultimate【Trial: -2024/12/31】【Remote access available】</source><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>Ardagna, Claudio A ; Asal, Rasool ; Damiani, Ernesto ; Vu, Quang Hieu</creator><creatorcontrib>Ardagna, Claudio A ; Asal, Rasool ; Damiani, Ernesto ; Vu, Quang Hieu</creatorcontrib><description>The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and higher performance and flexibility, than traditional on-premises resources, without having to care about infrastructure management. Still, cloud tenants remain concerned with the cloud's level of service and the nonfunctional properties their applications can count on. In the last few years, the research community has been focusing on the nonfunctional aspects of the cloud paradigm, among which cloud security stands out. Several approaches to security have been described and summarized in general surveys on cloud security techniques. The survey in this article focuses on the interface between cloud security and cloud security assurance. First, we provide an overview of the state of the art on cloud security. Then, we introduce the notion of cloud security assurance and analyze its growing impact on cloud security approaches. Finally, we present some recommendations for the development of next-generation cloud security and assurance solutions.</description><identifier>ISSN: 0360-0300</identifier><identifier>EISSN: 1557-7341</identifier><identifier>DOI: 10.1145/2767005</identifier><language>eng</language><publisher>Baltimore: Association for Computing Machinery</publisher><subject>Assurance ; Cloud computing ; Computer programs ; Flexibility ; Infrastructure ; Mathematical models ; Polls &amp; surveys ; Recommendations ; Resource management ; Security ; Security management ; Software services ; Studies</subject><ispartof>ACM computing surveys, 2015-09, Vol.48 (1), p.1-50</ispartof><rights>Copyright Association for Computing Machinery Sep 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c248t-26423e069551ecef6cc3e44e06149252f72b037f1dec5d7fbf039e91de4635673</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Ardagna, Claudio A</creatorcontrib><creatorcontrib>Asal, Rasool</creatorcontrib><creatorcontrib>Damiani, Ernesto</creatorcontrib><creatorcontrib>Vu, Quang Hieu</creatorcontrib><title>From Security to Assurance in the Cloud: A Survey</title><title>ACM computing surveys</title><description>The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and higher performance and flexibility, than traditional on-premises resources, without having to care about infrastructure management. Still, cloud tenants remain concerned with the cloud's level of service and the nonfunctional properties their applications can count on. In the last few years, the research community has been focusing on the nonfunctional aspects of the cloud paradigm, among which cloud security stands out. Several approaches to security have been described and summarized in general surveys on cloud security techniques. The survey in this article focuses on the interface between cloud security and cloud security assurance. First, we provide an overview of the state of the art on cloud security. Then, we introduce the notion of cloud security assurance and analyze its growing impact on cloud security approaches. Finally, we present some recommendations for the development of next-generation cloud security and assurance solutions.</description><subject>Assurance</subject><subject>Cloud computing</subject><subject>Computer programs</subject><subject>Flexibility</subject><subject>Infrastructure</subject><subject>Mathematical models</subject><subject>Polls &amp; surveys</subject><subject>Recommendations</subject><subject>Resource management</subject><subject>Security</subject><subject>Security management</subject><subject>Software services</subject><subject>Studies</subject><issn>0360-0300</issn><issn>1557-7341</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNpd0E1Lw0AQBuBFFKxV_AsBD_USndnP5liCVaHgQT2HdDOLKUm27iaH_nu3tCdPwwwPw8zL2D3CE6JUz9xoA6Au2AyVMrkREi_ZDISGHATANbuJcQcAXKKescU6-D77JDuFdjxko89WMU6hHixl7ZCNP5SVnZ-aW3bl6i7S3bnO2ff65at8yzcfr-_lapNbLpdjzrXkgkAXSiFZctpaQVKmCcqCK-4M34IwDhuyqjFu60AUVKRWaqG0EXP2eNq7D_53ojhWfRstdV09kJ9ihcakLzRySPThH935KQzpuqQ4FEbhEpNanJQNPsZArtqHtq_DoUKojoFV58DEH8utWQk</recordid><startdate>20150901</startdate><enddate>20150901</enddate><creator>Ardagna, Claudio A</creator><creator>Asal, Rasool</creator><creator>Damiani, Ernesto</creator><creator>Vu, Quang Hieu</creator><general>Association for Computing Machinery</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150901</creationdate><title>From Security to Assurance in the Cloud</title><author>Ardagna, Claudio A ; Asal, Rasool ; Damiani, Ernesto ; Vu, Quang Hieu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c248t-26423e069551ecef6cc3e44e06149252f72b037f1dec5d7fbf039e91de4635673</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Assurance</topic><topic>Cloud computing</topic><topic>Computer programs</topic><topic>Flexibility</topic><topic>Infrastructure</topic><topic>Mathematical models</topic><topic>Polls &amp; surveys</topic><topic>Recommendations</topic><topic>Resource management</topic><topic>Security</topic><topic>Security management</topic><topic>Software services</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ardagna, Claudio A</creatorcontrib><creatorcontrib>Asal, Rasool</creatorcontrib><creatorcontrib>Damiani, Ernesto</creatorcontrib><creatorcontrib>Vu, Quang Hieu</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM computing surveys</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ardagna, Claudio A</au><au>Asal, Rasool</au><au>Damiani, Ernesto</au><au>Vu, Quang Hieu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>From Security to Assurance in the Cloud: A Survey</atitle><jtitle>ACM computing surveys</jtitle><date>2015-09-01</date><risdate>2015</risdate><volume>48</volume><issue>1</issue><spage>1</spage><epage>50</epage><pages>1-50</pages><issn>0360-0300</issn><eissn>1557-7341</eissn><abstract>The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and higher performance and flexibility, than traditional on-premises resources, without having to care about infrastructure management. Still, cloud tenants remain concerned with the cloud's level of service and the nonfunctional properties their applications can count on. In the last few years, the research community has been focusing on the nonfunctional aspects of the cloud paradigm, among which cloud security stands out. Several approaches to security have been described and summarized in general surveys on cloud security techniques. The survey in this article focuses on the interface between cloud security and cloud security assurance. First, we provide an overview of the state of the art on cloud security. Then, we introduce the notion of cloud security assurance and analyze its growing impact on cloud security approaches. Finally, we present some recommendations for the development of next-generation cloud security and assurance solutions.</abstract><cop>Baltimore</cop><pub>Association for Computing Machinery</pub><doi>10.1145/2767005</doi><tpages>50</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0360-0300
ispartof ACM computing surveys, 2015-09, Vol.48 (1), p.1-50
issn 0360-0300
1557-7341
language eng
recordid cdi_proquest_miscellaneous_1770306120
source Business Source Ultimate【Trial: -2024/12/31】【Remote access available】; Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)
subjects Assurance
Cloud computing
Computer programs
Flexibility
Infrastructure
Mathematical models
Polls & surveys
Recommendations
Resource management
Security
Security management
Software services
Studies
title From Security to Assurance in the Cloud: A Survey
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T14%3A59%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=From%20Security%20to%20Assurance%20in%20the%20Cloud:%20A%20Survey&rft.jtitle=ACM%20computing%20surveys&rft.au=Ardagna,%20Claudio%20A&rft.date=2015-09-01&rft.volume=48&rft.issue=1&rft.spage=1&rft.epage=50&rft.pages=1-50&rft.issn=0360-0300&rft.eissn=1557-7341&rft_id=info:doi/10.1145/2767005&rft_dat=%3Cproquest_cross%3E1770306120%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c248t-26423e069551ecef6cc3e44e06149252f72b037f1dec5d7fbf039e91de4635673%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1720975181&rft_id=info:pmid/&rfr_iscdi=true