ABSTRACT
In this paper, we discuss security issues with Cloud Based Computing and Cloud Operating Systems. Cloud computing has recently experienced a significant increase in popularity as major companies such as Google and Microsoft have started to release cloud based products, advertise the use of the cloud, and even release an open source Cloud OS. As the general public becomes more aware of cloud based computing and the popularity increases the demand for security will increase. This paper discusses both unique security concerns for cloud computing as well as shared security issues between cloud and traditional computing. Current solutions for these security risks are also discussed and evaluated. In addition, we propose a method for allowing the user to select specific security levels of security for items and make a list of security items that all users should be aware of before opting to use cloud based services.
- Y. Chen, V. Paxson, and R. Katz. What's New About Cloud Computing Security? Technical Report UCB/EECS-2010-5, Berkeley, 2010Google Scholar
- Pianese, F., Bosch, P., Alessandro, D., Janssens, N., Stathopoulos, T., and Steiner, M. 2010. Toward a Cloud Operating System. Network Operations and Management Symposium Workshops (NOMS Wksps).Google Scholar
- Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L. 2009. On technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing. Google ScholarDigital Library
- Geer, D. 2009. The OS Faces a Brave New World. IEEE Computer Society Volume 42, issue 10 p. 15--17. Google ScholarDigital Library
- Ertaul, L. and Singhal, S. 2009. Security Challenges in Cloud Computing. California State University, East Bay. Academic paper http://www.mcs.csueastbay.edu/~lertaul/Cloud%20Security%20CamREADY.pdfGoogle Scholar
- T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. "Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds." ACM CCS 2009 Google ScholarDigital Library
- A. Cavoukian, "Privacy in the clouds", in Springer Identity in the Information Society, Published online: 18 December 2008. http://www.ipc.on.ca/images/Resources/privacyintheclouds.pdfGoogle Scholar
Index Terms
- Who can you trust in the cloud?: a review of security issues within cloud computing
Recommendations
Cloud computing security
Highlights We survey approaches to protecting data from a cloud infrastructure provider. We explain some difficulties with using fully homomorphic encryption for cloud computing applications. We describe a method in which in-browser key translation ...
On Technical Security Issues in Cloud Computing
CLOUD '09: Proceedings of the 2009 IEEE International Conference on Cloud ComputingThe Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure ...
A method for trust management in cloud computing: Data coloring by cloud watermarking
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often ...
Comments