Addressing cloud computing security issues

@article{Zissis2012AddressingCC,
  title={Addressing cloud computing security issues},
  author={Dimitrios Zissis and Dimitrios Lekkas},
  journal={Future Gener. Comput. Syst.},
  year={2012},
  volume={28},
  pages={583-592}
}
The recent emergence of cloud computing has drastically altered everyone's perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a… Expand
Cloud Computing Security: An Issue of Concern
Cloud computing is an emerging technology exemplar that migrate current technological and computing concepts into utility-like solutions. Cloud computing as a ubiquitous on-demand model for accessingExpand
An Analytical Study on Security Concerns in Cloud Computing
Cloud computing provides the ability to utilize scalable, distributed computing environments via the Internet. Over the years, cloud computing has grown from being a promising business concept to aExpand
Security Vulnerabilities , Threats in Cloud Computing and The Examination of Security Measures Against These Threats
Cloud computing is a development of parallel and distributed computing and also virtualization technologies symbolizing the new era. It is a popular technology with flexible, cost-effective andExpand
Cloud Computing Security: A Survey
TLDR
This work identifies cloud vulnerabilities, classify known security threats and attacks, and presents the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Expand
A Computational Approach for Secure Cloud Computing Environments
TLDR
This chapter explores the security issues in cloud computing systems and shows how to solve these problems using a quantitative security risk assessment model. Expand
Cloud Computing Security: An Investigation into the Security Issues and Challenges Associated with Cloud Computing, for both Data Storage and Virtual Applications
In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry’s most developing section. Now that the worldExpand
A survey of security issues for cloud computing
  • M. Khan
  • Computer Science
  • J. Netw. Comput. Appl.
  • 2016
TLDR
A survey of security issues in terms of security threats and their remediations is presented and a parametric comparison of the threats being faced by cloud platforms is performed. Expand
A Survey of the State of Cloud Security
TLDR
A survey on some of the common threats and associated risks on cloud platforms along with ways of tackling these threats is presented and the data management and security model of some the leading cloud service providers are reviewed. Expand
Three Level Cloud Computing Security Model
TLDR
This paper proposes a methodology to over come the security threats that can take place on three levels i.e login authentication, network security and Storage Security by building an Email system to provide security on all three levels. Expand
An Exploration on Cloud Computing Security Strategies and Issues
TLDR
This paper has focused on the data security issues found in the cloud computing and discovered an appropriate solution and a private cloud domain. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 38 REFERENCES
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
TLDR
This paper defines Cloud computing and provides the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs), and provides insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA) oriented resource allocation. Expand
Grid and Cloud Computing, A Business Perspective on Technology and Applications
TLDR
This book provides a thorough understanding of the fundamentals of Grids and Clouds and of how companies can benefit from them and practical guidelines on how to successfully introduce Grid and Clouds in companies are provided. Expand
Distributed Systems Security
A distributed system is a set of autonomous units connected through some network. The most used distribution architectures are CORBA, DCOM, and RMI. CORBA is an architectural standard forExpand
Establishing and managing trust within the public key infrastructure
The capabilities afforded by the Public Key Infrastructure certainly facilitate the growth of secure internet-based transactions. However, the provision of acceptable and effective certificationExpand
INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD
Abstract : For many years, the security research community has focused on the confidentiality as security, an a solid analytical foundation for addressing confidentiality issues has evolved. Now itExpand
The NIST Definition of Cloud Computing
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) thatExpand
Dynamic trust enhanced security model for trusted platform based services
TLDR
This paper argues that given the nature of both binary and property based attestation mechanisms, an attestation requester cannot be absolutely certain if an attesting platform will behave as it is expected to behave and proposes TESM, a hybrid trust model based on subjective logic to reduce such uncertainties. Expand
Security in computing
TLDR
This book describes the security pitfalls inherent in many important computing tasks today and points out where existing controls are inadequate and serious consideration must be given to the risk present in the computing situation. Expand
A Flexible Attribute Based Access Control Method for Grid Computing
TLDR
The paper puts forward an authorization framework that supports ABMAC and is implemented in the Globus Toolkit release 4 (GT4) and provides a flexible and scalable authorization mechanism that can support multiple existing policies in a Grid system. Expand
Quality assured trusted third parties for deploying secure internet-based healthcare applications
TLDR
The main objective is to provide all the basic guidelines towards the development of a quality system for a TTP as an organisation, which could be mapped directly to the requirements of ISO-9000 standards. Expand
...
1
2
3
4
...