Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey

dc.contributor.authorShohreh Hosseinzadeh
dc.contributor.authorSami Hyrynsalmi
dc.contributor.authorMauro Conti
dc.contributor.authorand Ville Leppänen
dc.contributor.organizationfi=ohjelmistotekniikka|en=Software Engineering|
dc.contributor.organization-code1.2.246.10.2458963.20.71310837563
dc.contributor.organization-code2606804
dc.converis.publication-id2968970
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/2968970
dc.date.accessioned2022-10-28T13:17:52Z
dc.date.available2022-10-28T13:17:52Z
dc.description.abstract<p> The development of cloud computing has facilitate the organizations with its services. This makes the security and privacy of the cloud even more significant.</p> <p> Diversification and obfuscation approaches are of the most promising proactive techniques that protect computers from harmful malware, by preventing them to take advantage of the security vulnerabilities. There is a large body of research on the use of diversification and obfuscation techniques for improving the security in various domains, including cloud computing. Cloud computing provides an excellent setting for applying diversification/obfuscation, as the computing platforms (virtual machines) are implemented in software.</p> <p> The main objective of this study is to determine in what ways obfuscation and diversification techniques are used to enhance the security and privacy of the cloud computing, and discover the potential avenues for the further research. To achieve this goal, we systematically review and report the papers that discuss/propose a technique to enhance the security and privacy of the cloud, using diversification and obfuscation techniques. As the result of the search we collected 43 papers published on the topic. In this report we present the process of data collection, analysis of the results, and classification of the related studies. The classification is done based on how the diversification/obfuscation techniques are used to enhance the security in cloud computing environment. The presented study gives a clear view of the state of the art of the existing works in the field, and sheds light on the areas remained intact which could be avenues for further research. The existing works cover surprisingly a small set of the wealth of opportunities for diversification/obfuscation.</p>
dc.format.pagerange529
dc.format.pagerange535
dc.identifier.isbn978-1-4673-9560-1
dc.identifier.issn2330-2194
dc.identifier.olddbid181122
dc.identifier.oldhandle10024/164216
dc.identifier.urihttps://www.utupub.fi/handle/11111/36991
dc.identifier.urnURN:NBN:fi-fe2021042612785
dc.language.isoen
dc.okm.affiliatedauthorHosseinzadeh, Shohreh
dc.okm.affiliatedauthorHyrynsalmi, Sami
dc.okm.affiliatedauthorLeppänen, Ville
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationinternational co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA4 Conference Article
dc.publisher.countryUnited Statesen_GB
dc.publisher.countryYhdysvallat (USA)fi_FI
dc.publisher.country-codeUS
dc.relation.conferenceIEEE International Conference on Cloud Computing Technology and Science
dc.relation.doi10.1109/CloudCom.2015.29
dc.source.identifierhttps://www.utupub.fi/handle/10024/164216
dc.titleSecurity and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey
dc.title.book2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
dc.year.issued2015

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
CloudSecurity.pdf
Size:
216.28 KB
Format:
Adobe Portable Document Format