You are on page 1of 6

2018 4th IEEE International Conference on Big Data Security on Cloud

Critical Security Issues in Cloud Computing: A


Survey
Xiaotong Sun
Department of Computer Science
Pace University
New York, NY 10038, USA
xs43599n@pace.edu

Abstract—An exponential growth of cloud computing is


dramatically changing contemporary network service man-
ners. A large scope of cloud-based service offerings, X-as-a-
Service (XaaS), are empowering flexible adoptions with on-
demand provisions. However, cloud computing also introduces
a series of security concerns, even though there are numerous
advantages of using cloud computing. Understanding security
concerns in cloud computing is a fundamental requirement for
successfully adopting cloud solutions. This paper focuses on a
variety of security issues in cloud computing and accomplishes
a survey that addresses three major security dimensions of Fig. 1: Dimensions of Cloud Computing Security
cloud security, including computer security, network security,
and information security. Literature review provides a holistic
view of cloud security as well as converges recent achievements
in the field. The main findings of this work can provide future
party service providers or unexpected data users. It implies
research in the field of cloud security with theoretical supports
and evidence. that most cloud applications are facing threats from both
Index Terms—Cloud computing, security, privacy, data stor- insiders and outsiders [9], [10]. Typical cloud risks cover
age, networking security data abuse, malicious insiders, insecure interface and APIs,
shared technology issues, data loss or leakage, account or
I. I NTRODUCTION service hijacking, and unknown risk profile. A proper and
With the rapid development of the network technology, accurate understanding on cloud security is a fundamental
cloud computing has bas grown as a broadly accepted requirement for a success of the cloud deployment.
deployment in business and has been driving people’s lives This paper thereby focuses on discerning typical aspects
towards a connected environment [1]–[3]. One of the major of the cloud security. In order to provide a panoramic view
advantages of cloud computing is that it can offer numerous of cloud security, we show a high structure of security di-
service models depending on users’ demands. Service mod- mensions in cloud computing in Fig. 1. There are three main
els can be represented as an X-as-a-Service (XaaS), in which dimensions, as shown in the figure, which include computer
X refers to the computing offerings [4]. Basic computing security, network security, and information security. These
offerings include infrastructure, software, and platform [5]. three dimensions will guide the structure of this survey.
Meanwhile, service offerings, Xs, can be represented in any At each dimension, the survey only selects significant and
manners that are deliverable to users, such as information, representative aspects for reviews due to the limit of pages.
security, back-end, and process [6]. The flexible service Moreover, literature reviews completed by this survey
deliveries have remarkably scaled up the service content on work mainly focus on updated research accomplishments
the network. rather than going through a history of cloud computing. The
Despite the high convenience and flexibility brought objective of this work is to provide scholars and practitioners
by cloud computing, the implementation of cloud-based with a knowledge scaffold about recent The main contribu-
solutions is still encountering restrictions deriving from tions of this survey are threefold: (1) this work highlights
security concerns. Due to the connected environment, cloud vital vulnerabilities of cloud security and covers key issues
computing implementations are facing all vulnerabilities of in the field; (2) we synthesize characteristic solutions to each
the network [7], [8]. Meanwhile, besides networking vulner- type of threats in cloud security; (3) discussions deriving
abilities, cloud applications also need to deal with potential from main findings provide future security research with
threats from involvers in the cloud, such as unknown third theoretical supports.

978-1-5386-4399-0/18/$31.00 ©2018 IEEE 216


DOI 10.1109/BDS/HPSC/IDS18.2018.00053

Authorized licensed use limited to: Cornell University Library. Downloaded on September 04,2020 at 13:44:35 UTC from IEEE Xplore. Restrictions apply.
The reminder of this work is organized by the following Next, a Clickjacking attack generally is considered an
order. Section II is the main body of this paper, which adversarial activity at the transport layer. The attack usually
addresses three major security dimensions in cloud com- is attached to a browser, in which the attack is launched by
puting, including computer security, network security, and a clickable object on the page with embedded adversarial
information security. Each dimensions is structured by a codes or a script. Wu et al. [15] emphasized the a stealthy
number of sub-dimensions. Next, Section III states the clickjacking attack could take place by clicking on any ma-
main findings obtained from literature review and gives a licious object on the page, such as a fake system reminder.
discussion about future work. A conclusion is drawn based Users would not notice the adversarial activities since re-
on our main findings. launching malicious software could be automatic, such as
using a timer. Some examples of clickjacking included
II. S ECURITY D IMENSIONS IN C LOUD C OMPUTING Likejacking [16] and Cursorjacking.
Furthermore, eavesdropping and spoofing are two attack
A. Computer Security
methods that generally take place at network layer. An
Computer security is a wide concept that covers most eavesdropping attack mainly targets at those unencrypted
aspects of computer system protections. The protection data by capturing small packets for stealing information.
objectives include hardware, software and information. This A spoofing attack is an adversarial action that pretends to
section selects three typical aspects of computer security, be a legal communicator by making fake data or identity.
which are attack types, access control, and cryptography. Recently, some studies have tried to lower down the chance
1) Attack Types: We summarize a number of typical of eavesdropping attacks. For instance, an investigation [17]
attack types in this section, which include Denial-of-Service has attempted to examine whether a dynamic encryption
(DoS), clickjacking, eavesdropping, spoofing, social en- strategy could increase privacy protection. This method gave
gineering, tampering, privilege escalation, and backdoor those data that carried sensitive information the priority in
attacks. Each attack is specific or non-specific to the net- order to deal with the computation workload caused by big
working connection layer or operating system. Fig. 2 shows volume data. From the perspective of adversaries, a research
a synthesis of the typical attacks and their attached layers. proposed a mixed method that combined spoofing and
A brief review about attack types is given below. jamming attacks [18]. The attack effect could be maximized
when considering the restriction of the power supply.
Moreover, some attacks may take place at all layers,
such as social engineering and tampering attacks. A social
engineering attack is a type of adversarial actions utilizing
psychological behaviors for the purpose of information
stealing. Some examples of social engineering techniques
are Pretexting, Phishing [19], and Baiting attacks [20]. A
tampering attack is a presentation of a group of attacks that
modify software settings or hardware configuration without
users’ permissions.
Finally, privilege escalation and backdoor attacks are two
common malicious actions at the operating system layer.
Fig. 2: Main attack types and their layers.
A privilege escalation attack mainly describes an adversary
who utilizes vulnerabilities/bugs of the system to obtain
First, a DoS attack is a group of malicious methods the access to the information. A backdoor attack refers to
that prevent users from reaching the desired computing adversaries learn the hidden part of the program or system
resource via the network. Main issues have been surveyed and utilize it to illegally obtain information. Tsoutsos et
by prior work that can be referred to literatures [11], al. [21] developed an zero-overhead privilege escalation
[12]. Lyamin et al. [13] proposed a real-time method for approach for microprocessor modifications. Another study
detecting DoS attacks in Vehicular Ad-Hoc Networks. This explored an approach using multi-IDS systems that could
method focused on detecting jamming attacks based on the detect privilege escalation or backdoor attacks in multi-tier
observations of the false alarm probabilities. Another study web applications. Additionally, Zhang et al. [22] argued that
[14] had an attempt to utilize the advantage of Software- it was possible to prevent backdoor attacks at the system de-
Defined Network (SDN) to defeat Distributed Denial-of- sign stage by using their proposed technique. The approach
Service (DDoS) attacks. The authors also highlighted the was called VeriTrust that continuously examined verification
contradictory relationship between SDN and DDoS attacks corners for identifying potential adversarial triggers.
such that a few research issues were raised. The next section will discuss the aspect of access control.

217

Authorized licensed use limited to: Cornell University Library. Downloaded on September 04,2020 at 13:44:35 UTC from IEEE Xplore. Restrictions apply.
2) Access Control: An access control system refers to We will discuss the last key aspect of computer security
a series of system configuration that determines whether a in the next section.
user can have the access to a certain information. The mech- 3) Cryptography in Clouds: Cryptography in cloud com-
anism of an access control system is to examine whether the puting has its own characteristics [26], [27]. An ideal
access requester matches the criterion. Common network cryptographic design for cloud-based applications need to
access enforcement methods include IEEE 802.1X, Virtual deal with both insider and outsider threats. However, most
Local Area Networks (VLANs), firewall, and Dynamic Host cryptographic approaches could only take care one side,
Configuration Protocol (DHCP) management. mostly outsider threats. In fact, threats from insiders also
Meanwhile, the core of most access control systems is restricts the implementation of cloud solutions, due to un-
applying a Computer File System (CFS), which creates a list certain operations done on the clouds and unknown parties
of requirements/criterion for access examinations. A main who have accesses to the data.
vulnerability of contemporary CFS is that the system maybe There are three advanced encryption types that match
fooled by adversaries by making fake data for matching the requirement of cloud computing for both insider and
criterion. In line with current access control settings, there outsider threats. The first option is an Attribute-based En-
are a few components in a typical access control system. cryption (ABE). This type of solutions has been explored
Four main parts are shown in Fig. 3. Among these com- over years and two common kinds of ABE are Ciphertext-
ponents, authentication methods are usually concerned by policy ABE (CP-ABE) and Key-policy ABE (KP-ABE). Li
system designers. Applying an Extensible Authentication et al. [28] have investigated the flexibility of using ABE
Protocol (EAP) transport service can support the authen- to secure personal health records in clouds. Lat et al. [29]
tication information exchange between client system and an argued that a verifiability should be a requirement of ABE
authentication server. Some examples supported by EAP are and proposed method for verifying outsourced decryption.
EAP Transport Layer Security, EAP Tunneled TLS, EAP Similarly, another study [30] addressed the checkability of
Generalized Pre-Shared Key, and EAP-IKEv2. the outsourced decryption. Two main issues in ABE designs
include (1) complexity of the cryptographic key design will
become complex when the number of attributes in access
strategy set grows.
Moreover, the second alternative is Fully Homomorphic
Encryption (FHE). A proper FHE allows arithmetic opera-
tions over the decrypted data in the cloud, such that cloud
operators (insider threats) cannot access plain-texts. The
implementation of FHE can be also combined with other
Fig. 3: Main components of access control.
security protocol to against threats from outsider. A basic
manipulation process of an FEH is shown in Fig. 4. We
Moreover, some advanced access control approaches have can observe that operators on the cloud sider always reach
been explored by recent research as well. One popular encrypted data.
research direction is to design an Attribute-based Access
Control (AAC) to strengthen the security. The advantage of
using an AAC method is that some attributes can be hardly
fabricated by adversaries. A few recent achievements are
reviewed as follows.
Wang et al. [23] developed a hierarchical attribute-based
approach for implementing multi-level access controls. Qiu
et al. [24] had a focus of data security in the financial
industry and proposed an attribute-based semantic access
control method. This method used ontologies to formu-
late relationship between data owners and data usage to
avoid unexpected parties reaching data in the context of Fig. 4: Basic manipulation process of an FHE.
cloud computing. Some other studies had distinct focuses.
For example, Cheung and his colleagues [25] studied the Despite a perfect match for cloud computing, there is no
optimization approach for spectrum allocations in two-tier active FHE adoption in practice. Gentry’s FHE [31]–[33] is
networks, by which access controls are determined. The considered the first logical method for achieving homomor-
authors also considered the quality of service constraints phism encryptions. However, this approach is far away from
covering success probabilities and per-tier minimum rates. the practical implementation due to its heavy computations

218

Authorized licensed use limited to: Cornell University Library. Downloaded on September 04,2020 at 13:44:35 UTC from IEEE Xplore. Restrictions apply.
and noise creations. Many scholars have tried to improve the encryption, and traffic analysis [49]. Meanwhile, an active
efficiency of this approach from both cryptographic design attack means that an intruder who distorts networking
and hardware, but current performance still cannot satisfy operations or obtains access illegally via malicious codes.
the requirement of the industry [34]–[36]. A few typical active attacks include virus, eavesdropping,
Recent break-through of FHE design took place when a DoS attack, spoofing, Smurf attack, man in the middle
totally distinct direction was addressed. A new design [37]– attack, ARP poisoning, buffer overflow, heap overflow,
[39] was proposed, which used tensor theory to achieve SQL injection, phishing, and cross-site scripting. Except the
homomorphism results. The advantages of this approach are attack types mentioned in Section II-A, we briefly introduce
threefold. First, the complexity of this approach was lower a number of representative active attack types.
than Gentry’s method so that its execution efficiency was First, Address Resolution Protocol (ARP) poisoning is a
higher. Second, this approach did not create noise during kind of active attack that relies on the spoofing attacks on
the whole mathematical process; thereby, data users can a Local Area Network (LAN) via a spoofed ARP message
always obtain accurate results. Finally, data can be secured [50], [51]. Basic idea of ARP poisoning is causing traffic
during the whole process of data usage. The problem of this deceiving via pretending a host’s IP address so that LAN
approach is that the workload of decryptions is heavy. users send message to malicious users instead of the default
Finally, the last option for cloud-oriented encryption is gateway. Yang et al. [52] points out that ARP’s vulnerability
Searchable Encryption (SE) that can be referred to liter- is that it does not have a verification mechanism for veri-
atures in [40], [41]. This type of encryptions emphasizes fying authenticity of the ARP messages, even though it is
the searching operation rather than mathematic operations. a trusting protocol. Attacks often take place from malicious
The main challenge of this type of encryption is that it hosts in an LAN. Fig. 5 illustrates a basic mechanism of
generally requires a large of key distributions for both ARP poisoning.
encryptions and searching. Naveed et al. [42] highlighted
the problem of identifying basic primitives to achieve blind
storage. Another study [43] also addressed the problem
of the key distributions and designed a concept of key-
aggregate searchable encryption. In this approach, only one
single key is required by a data owner for sharing sharing a
large amount documents with one user. In order to obtain a
higher-level security, Han et al. [44] considered both ABE
and SE and proposed a general transformation approach that Fig. 5: Basic mechanism of ARP poisoning.
covers features of ABE and SE.
In summary, we have reviewed a few crucial aspects Next, a Smurf attack is a kind of DDoS attack that
of computer security in this section, which covers attack launches a traffic flood to the victim’s device over the In-
types, access control systems, and cryptography in cloud ternet Control Message Protocol (ICMP) [53]. The process
computing. The review not only summarizes key facets of the Smurf attack mainly consists of two steps. The first
but also points out existing problems as well as recent step is that an attacker send out ICMP packets with spoofed
achievements. We will talk about network security in next IP to numerous devices. The second step is that the attacker
section. receive ICMP responses and redirect them to the victim
device. Thus, victim device will receive a flood traffic if
B. Network Security the number of the responses is great. We provide a process
In this section, two sides are addressed to describe main diagram of Smurf attack in Fig. 6. In the figure, solid lines
issues in network security, which are attack types and recent refer to ICMP packets with spoofed IP; broken lines refer
explorations in enhancing security of the network. to ICMP responses.
1) Attack Types: The attack types in network security Next section will address the enhancement of network
have many overlaps with computer security. As a web-based security.
technique, cloud computing is facing all network-oriented 2) Network Security Enhancement: As one of the most
attack types. From the perspective of the attack triggers, broadly adopted security services, Secure Socket Layer
types of attacks can be categorized into two groups, namely, (SSL) establishes an encrypted connections between a web
passive and active attacks. server and a browser. Its implementations are generally
A passive attack refers to malicious activities that grabs based on a set of security protocols. With the development
information while directly intercepting traffics of the net- of the Internet, SSL cannot satisfy the requirement of the
work [45]. Common methods against passive attacks include security and is being replaced by another protocol set that
wiretapping [46], port scanner [47], idle scan [48], data is Transport Layer Security (TLS).

219

Authorized licensed use limited to: Cornell University Library. Downloaded on September 04,2020 at 13:44:35 UTC from IEEE Xplore. Restrictions apply.
A few approaches can enhance the level of privacy
protection in the cloud. First, increasing data control during
the whole data usage cycle can reduce the risk caused by
loss of control. A data usage cycle covers a chain of states,
including at rest, in transit, in use, and access. Next, en-
cryption is a positive alternative for data owners (clients) to
prevent data from malicious actions during transmissions. In
most situations, an encrypted data package is assumed to be
secure. Future solutions may include advanced encryption
technique, such as FHE and block-chain techniques. Finally,
Fig. 6: Basic mechanism of Smurf attack. a multi-encryption strategy will become a trend to deal with
big data privacy. Encryption priority will be given to those
data that carry sensitive information so that the selection of
Moreover, the methods against adversaries are various the encryption is a dynamic work.
and some of them are mentioned in prior sections. Each
III. C ONCLUSIONS
defense method maybe suitable for one or multiple net-
work threats. Representative defense methods include ac- In this paper, a survey was accomplished to review all cru-
cess control, software-oriented security tool, authentication, cial security aspects of cloud computing. The convergence
authorization, cryptography, firewall, Intrusion Detection was organized by three parts, which were computer security,
System (IDS), Intrusion Prevention System (IPS), and secure network security, and information security. The literature
gateway. review synthesized major threats and vulnerabilities of cloud
computing, as well as the corresponding defense methods
C. Information Security or potential solutions. The survey also depicted that security
issues in cloud computing derived from both insider and
This section concentrates on the information security
outsider threats. Traditional security protocols could mainly
issues in cloud computing. Two aspects are involved in
prevent risks from outsider threats; an effective FHE was
this security, which are identity management and privacy
a desired solution even though there was yet no ubiquitous
protection.
solution available.
1) Identity Management: The concept of identity man-
agement is a group of activities to verify whether a person or R EFERENCES
a group of users has/have access to a computing object, such [1] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,
as an application or a system. Major activities during the G. Lee, D. Patterson, A. Rabkin, and I. Stoica. A view of cloud
verification process include identification, authentication, computing. Communications of the ACM, 53(4):50–58, 2010.
[2] S. Subashini and V. Kavitha. A survey on security issues in
and authorization. It has an overlap with the operation service delivery models of cloud computing. Journal of network
of the access control. However, identity management and and computer applications, 34(1):1–11, 2011.
access control have distinct focuses. Normally, identity [3] K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong. Dynamic energy-aware
cloudlet-based mobile cloud computing model for green computing.
management focus on authentication, while access control Journal of Network and Computer Applications, 59:46–54, 2015.
mainly addresses authorization. [4] P. Mell and T. Grance. The NIST definition of cloud computing.
Moreover, there are some challenges for current identity Special Publication - National Institute of Standards and Technology,
U.S. Department of Commerce, 2011.
management from the perspective of the implementation [5] L. Qian, Z. Luo, Y. Du, and L. Guo. Cloud computing: An overview.
[54]. The first challenge is password management in a Cloud computing, pages 626–631, 2009.
distributed environment. The cost of identity management [6] B. Hayes. Cloud computing. Communications of the ACM, 51(7):9–
11, 2008.
will be increased when authentication systems are deployed [7] T. Dinh, Y. Xuan, M. Thai, P. Pardalos, and T. Znati. On new
in multi-geographic locations. The other challenging issue approaches of assessing network vulnerability: hardness and approx-
is to secure identity information. In the distributed context, imation. IEEE/ACM Transactions on Networking, 20(2):609–619,
2012.
attackers have a chance to monitor identity information if [8] T. Khorshed, A. Ali, and S. Wasimi. A survey on gaps, threat remedi-
authentication system is connected to a remote server. There ation challenges and some thoughts for proactive attack detection in
will be more threats when wireless networks are used. cloud computing. Future Generation computer systems, 28(6):833–
851, 2012.
2) Privacy Protection: Privacy concern is a common [9] S. Stolfo, M. Salem, and A. Keromytis. Fog computing: Mitigating
issue in the implementation of cloud computing. Data car- insider data theft attacks in the cloud. In Security and Privacy
rying sensitive information are adversaries’ targets. What is Workshops (SPW), 2012 IEEE Symposium on, pages 125–128, San
Francisco, CA, USA, 2012. IEEE.
more, data owners have rare control on their data when data [10] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. Toward secure
are stored/operated on the remote cloud server. Data trades and dependable storage services in cloud computing. IEEE Trans. on
between service providers also threaten users’ privacy. Services Computing, 5(2):220–232, 2012.

220

Authorized licensed use limited to: Cornell University Library. Downloaded on September 04,2020 at 13:44:35 UTC from IEEE Xplore. Restrictions apply.
[11] S. Zargar, J. Joshi, and D. Tipper. A survey of defense mechanisms [32] V. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homo-
against distributed denial of service (DDoS) flooding attacks. IEEE morphic encryption over the integers. In EUROCRYPT, pages 24–43.
communications surveys & tutorials, 15(4):2046–2069, 2013. Springer, French Riviera, 2010.
[12] Q. Yan, F. Yuand Q. Gong, and J. Li. Software-defined networking [33] C. Gentry and S. Halevi. Implementing Gentry’s fully-homomorphic
(SDN) and distributed denial of service (DDoS) attacks in cloud com- encryption scheme. In Advances in Cryptology–EUROCRYPT, pages
puting environments: A survey, some research issues, and challenges. 129–148. Springer, Tallinn, Estonia, 2011.
IEEE Communications Surveys & Tutorials, 18(1):602–622, 2016. [34] V. Vaikuntanathan. Computing blindfolded: New developments in
[13] N. Lyamin, A. Vinel, M. Jonsson, and J. Loo. Real-time detection of fully homomorphic encryption. In IEEE 52nd Annual Symposium on
denial-of-service attacks in IEEE 802.11 p vehicular networks. IEEE Foundations of Computer Science, pages 5–16, Palm Springs, CA,
Communications letters, 18(1):110–113, 2014. USA, 2011. IEEE.
[14] Q. Yan and F. Yu. Distributed denial of service attacks in software- [35] D. Stehlé and R. Steinfeld. Faster fully homomorphic encryption.
defined networking with cloud computing. IEEE Communications In Advances in Cryptology-ASIACRYPT, pages 377–394. Springer,
Magazine, 53(4):52–59, 2015. Singapore, 2010.
[15] L. Wu, B. Brandt, X. Du, and B. Ji. Analysis of clickjacking attacks [36] W. Wang, Y. Hu, L. Chen, X. Huang, and B. Sunar. Exploring the
and an effective defense scheme for android devices. In Communica- feasibility of fully homomorphic encryption. IEEE Transactions on
tions and Network Security (CNS), 2016 IEEE Conference on, pages Computers, 64(3):698–706, 2015.
55–63, Philadelphia, PA, USA, 2016. IEEE. [37] K. Gai and M. Qiu. Blend arithmetic operations on tensor-based fully
[16] C. Wisniewski. What is “likejacking”? sophos senior secu- homomorphic encryption over real numbers. IEEE Transactions on
rity advisor chester wisniewski explains this malicious face- Industrial Informatics, PP(99):1, 2017.
book phenomenon. url=https://www.sophos.com/en-us/security- [38] K. Gai, M. Qiu, Y. Li, and X. Liu. Advanced fully homomorphic
news-trends/security-trends/what-is-likejacking.aspx. encryption scheme over real numbers. In Cyber Security and Cloud
[17] K. Gai, M. Qiu, and H. Zhao. Privacy-preserving data encryption Computing (CSCloud), 2017 IEEE 4th International Conference on,
strategy for big data in mobile cloud computing. IEEE Transactions pages 64–69, New York, USA, 2017. IEEE.
on Big Data, PP(99):1, 2017. [39] K. Gai and M. Qiu. An optimal fully homomorphic encryption
[18] K. Gai, M. Qiu, Z. Ming, H. Zhao, and L. Qiu. Spoofing-jamming scheme. In IEEE 3rd International Conference on Big Data Security
attack strategy using optimal power distributions in wireless smart on Cloud, pages 101–106, Beijing, China, 2017. IEEE.
grid networks. IEEE Transactions on Smart Grid, 8(5):2431 – 2439, [40] C. Liu, L. Zhu, M. Wang, and Y. Tan. Search pattern leakage in
2017. searchable encryption: Attacks and new construction. Information
[19] T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social Sciences, 265:176–188, 2014.
phishing. Communications of the ACM, 50(10):94–100, 2007. [41] E. Stefanov, C. Papamanthou, and E. Shi. Practical dynamic search-
[20] A. Maiti, O. Armbruster, M. Jadliwala, and J. He. Smartwatch- able encryption with small leakage. In NDSS, volume 14, pages
based keystroke inference attacks and context-aware protection mech- 23–26, San Diego, CA, USA, 2014.
anisms. In Proceedings of the 11th ACM on Asia Conference [42] M. Naveed, M. Prabhakaran, and C. Gunter. Dynamic searchable
on Computer and Communications Security, pages 795–806, Xi’an, encryption via blind storage. In Security and Privacy (SP), 2014
China, 2016. ACM. IEEE Symposium on, pages 639–654. IEEE, 2014.
[43] B. Cui, Z. Liu, and L. Wang. Key-aggregate searchable encryption
[21] N. Tsoutsos and M. Maniatakos. Fabrication attacks: Zero-overhead
(KASE) for group data sharing via cloud storage. IEEE Transactions
malicious modifications enabling modern microprocessor privilege
on computers, 65(8):2374–2385, 2016.
escalation. IEEE Transactions on Emerging Topics in Computing,
[44] F. Han, J. Qin, H. Zhao, and J. Hu. A general transformation from KP-
2(1):81–93, 2014.
ABE to searchable encryption. Future Generation Computer Systems,
[22] J. Zhang, F. Yuan, L. Wei, Y. Liu, and Q. Xu. VeriTrust: Verification
30:107–115, 2014.
for hardware trust. IEEE Transactions on Computer-Aided Design of
[45] D. Kapetanovic, G. Zheng, and F. Rusek. Physical layer security for
Integrated Circuits and Systems, 34(7):1148–1161, 2015.
massive MIMO: An overview on passive eavesdropping and active
[23] Z. Wan, J. Liu, and R. Deng. HASBE: a hierarchical attribute-based
attacks. IEEE Communications Magazine, 53(6):21–27, 2015.
solution for flexible and scalable access control in cloud computing.
[46] S. El Rouayheb, E. Soljanin, and A. Sprintson. Secure network coding
IEEE transactions on information forensics and security, 7(2):743–
for wiretap networks of type II. IEEE Transactions on Information
754, 2012.
Theory, 58(3):1361–1371, 2012.
[24] M. Qiu, K. Gai, B. Thuraisingham, L. Tao, and H. Zhao. Proactive [47] E. Bou-Harb, M. Debbabi, and C. Assi. Cyber scanning: a com-
user-centric secure data scheme using attribute-based semantic access prehensive survey. IEEE Communications Surveys & Tutorials,
controls for mobile clouds in financial industry. Future Generation 16(3):1496–1519, 2014.
Computer Systems, 80:421–429, 2018. [48] L. Kekely, J. Kučera, V. Puš, J. Kořenek, and A. Vasilakos. Software
[25] C. Cheung, T. Quek, and M. Kountouris. Throughput optimiza- defined monitoring of application protocols. IEEE Transactions on
tion, spectrum allocation, and access control in two-tier femtocell Computers, 65(2):615–626, 2016.
networks. IEEE Journal on Selected Areas in Communications, [49] K. Gai, M. Qiu, L. Tao, and Y. Zhu. Intrusion detection techniques
30(3):561–574, 2012. for mobile cloud computing in heterogeneous 5G. Security and
[26] D. Zissis and D. Lekkas. Addressing cloud computing security issues. Communication Networks, pages 1–10, 2015.
Future Generation computer systems, 28(3):583–592, 2012. [50] G. Ibáñez, J. Carral, J. Arco, D. Rivera, and A. Montalvo. Arp-
[27] W. Diffie and M. Hellman. New directions in cryptography. IEEE path: Arp-based, shortest path bridges. IEEE communications letters,
transactions on Information Theory, 22(6):644–654, 1976. 15(7):770–772, 2011.
[28] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou. Scalable and secure [51] D. Abts and B. Felderman. A guided tour of data-center networking.
sharing of personal health records in cloud computing using attribute- Communications of the ACM, 55(6):44–51, 2012.
based encryption. IEEE Trans. on Parallel and Distributed Systems, [52] Y. Yang, K. McLaughlin, S. Sezer, T. Littler, E. Im, B. Pranggono, and
24(1):131–143, 2013. H. Wang. Multiattribute scada-specific intrusion detection system for
[29] J. Lai, R. Deng, C. Guan, and J. Weng. Attribute-based encryption power networks. IEEE Transactions on Power Delivery, 29(3):1092–
with verifiable outsourced decryption. IEEE Transactions on Infor- 1102, 2014.
mation Forensics and Security, 8(8):1343–1354, 2013. [53] D. Schneider. The state of network security. Network Security,
[30] J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang. Securely outsourcing 2012(2):14–20, 2012.
attribute-based encryption with checkability. IEEE Transactions on [54] J. Torres, M. Nogueira, and G. Pujolle. A survey on identity
Parallel and Distributed Systems, 25(8):2201–2210, 2014. management for the future network. IEEE Communications Surveys
[31] C. Gentry. A fully homomorphic encryption scheme. PhD thesis, & Tutorials, 15(2):787–802, 2013.
Stanford University, 2009.

221

Authorized licensed use limited to: Cornell University Library. Downloaded on September 04,2020 at 13:44:35 UTC from IEEE Xplore. Restrictions apply.

You might also like