Cloud Security

Flavio Lombardi, Roberto Di Pietro, Matteo Signorini

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

While the Cloud is still undergoing a spectacular growth, with novel paradigms being proposed, novel architectures being deployed, and the supporting HW and SW solutions being subject to an exponential pace of innovation, cloud security is still a vexed issue. On the one hand, this is the byproduct of what is indicated above. With such a fast pace of transformation, focus is on technology advancements and delivery, rather than security. On the other hand, if security is not addressed, the risk introduced by the very same paradigm can eventually hinder the further deployment and adoption of cloud solutions, especially for environments where compliance is at a premium—think of hospitals, governmental agencies, or critical business segments. In this chapter, we have several objectives: propose a survey of the context of Cloud technology and related background, identify the threats and security actors in the identified scenario, and discuss cloud security services. Moreover, we provide a systematization of Cloud security, regrouping the different cloud security abstraction layers, and discussing the related most relevant challenges. We also provide an in-depth dive into the supporting HW components of some of currently deployed cloud solutions: ARM and RISC-V processors. We finally conclude our journey into cloud security with some remarks and indications about the road ahead toward a secure cloud. A Summary provides a digest of what is exposed in this chapter.

Original languageEnglish (US)
Title of host publicationComputer and Information Security Handbook, Fourth Edition
Subtitle of host publicationVolumes 1-2
PublisherElsevier
Pages1081-1092
Number of pages12
Volume2
ISBN (Electronic)9780443132230
ISBN (Print)9780443132247
DOIs
StatePublished - Jan 1 2024

Keywords

  • ARM
  • Cloud forensics
  • Cloud security
  • Containers
  • Docker
  • RISC
  • Serverless
  • TEE
  • Threat actors
  • TTP
  • Unikernel
  • Virtualization

ASJC Scopus subject areas

  • General Mathematics

Fingerprint

Dive into the research topics of 'Cloud Security'. Together they form a unique fingerprint.

Cite this