Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
From security to assurance in the cloud: a survey
Ardagna C., Asal R., Damiani E., Vu Q. ACM Computing Surveys48 (1):1-50,2015.Type:Article
Date Reviewed: Apr 20 2016

Users expect that cloud service designers have included robust security mechanisms as essential aspects of the service. What differentiates one service from the other is cloud security assurance--consumers’ opportunity to gain justifiable confidence about the consistency of the service with respect to its security properties.

Ardagna et al. present a survey of over 300 high-quality publications on cloud security and assurance. The paper presents objective research and makes it easy for readers to select publications of interest quickly based on their own criteria. This is an excellent resource for those beginning to work in this area, as well as for security experts to get a broader view of the domain. It will also be beneficial reading for software system architects.

The authors adopt a specific methodology for selecting high-quality publications with clearly defined criteria, and then go on to build a taxonomy. The presentation follows a simple framework to summarize each publication surveyed, consistently: when, where, what, and how. The authors include crisp one- or two-line summaries of promising publications, to help readers choose.

The survey starts with the important security themes of vulnerabilities, threats, attacks, and risk evaluation. This section concludes by identifying an area that is less explored and of growing interest: attacks on the availability, confidentiality, and privacy of customer data. An important insight presented in the following section is related to cloud availability as a property at the intersection of security, reliability, and performance.

The authors present detailed summaries of 161 research papers in an elegant table. This table is the paper’s key contribution. It is very helpful for selecting publications of interest to dive deeper. The appendices compare existing surveys, white papers, and standards. The final section presents detailed results and a few recommendations for next-generation cloud security and assurance.

Reviewer:  Sundara Nagarajan Review #: CR144341 (1607-0508)
Bookmark and Share
  Featured Reviewer  
 
Distributed Systems (C.2.4 )
 
 
Cloud Computing (C.2.4 ... )
 
 
Security and Protection (K.6.5 )
 
 
Software Architectures (D.2.11 )
 
Would you recommend this review?
yes
no
Other reviews under "Distributed Systems": Date
The evolution of a distributed processing network
Franz L., Sen A., Rakes T. Information and Management 7(5): 263-272, 1984. Type: Article
Jul 1 1985
A geographically distributed multi-microprocessor system
Angioletti W., D’Hondt T., Tiberghien J.  Concurrent languages in distributed systems: hardware supported implementation (, Bristol, UK,871985. Type: Proceedings
Oct 1 1985
A fault tolerant LAN with integrated storage, as part of a distributed computing system
Boogaard H., Bruins T., Vree W., Reijns G.  Concurrent languages in distributed systems: hardware supported implementation (, Bristol, UK,1001985. Type: Proceedings
Aug 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy