Cloud Hooks: Security and Privacy Issues in Cloud Computing

@article{Jansen2011CloudHS,
  title={Cloud Hooks: Security and Privacy Issues in Cloud Computing},
  author={Wayne A. Jansen},
  journal={2011 44th Hawaii International Conference on System Sciences},
  year={2011},
  pages={1-10}
}
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 226 CITATIONS

Transparency service model for data security in cloud computing

  • 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Security implementation in cloud computing using user behaviour profiling and decoy technology

  • 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT)
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An Empirical Analysis of Security Issues in Cloud Environment

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A systematic review on cloud computing

VIEW 7 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2011
2019

CITATION STATISTICS

  • 18 Highly Influenced Citations

  • Averaged 16 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 58 REFERENCES

BlackHat presentation demo vids: Amazon

M. Slaviero
  • part 4 of 5, AMIBomb, August 8
  • 2009
VIEW 14 EXCERPTS
HIGHLY INFLUENTIAL

I/O for Virtual Machine Monitors: Security and Performance Issues

  • IEEE Security & Privacy
  • 2008
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Kernel-based Virtualization with KVM

A. Shah
  • Linux Magazine, issue
  • 2008
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Austin Plane Crash: Pilot Joseph Andrew Stack May Have Targeted IRS Offices

N. Katz
  • Says FBI, CBS News, February 18
  • 2010
VIEW 1 EXCERPT

How to Negotiate a Better Cloud Computing Contract

S. Overby
  • CIO, April 21
  • 2010
VIEW 2 EXCERPTS

Mozilla Confirms Security Threat from Malicious Firefox Add-Ons

S. M. Kerner
  • eSecurity Planet, February 5
  • 2010
VIEW 1 EXCERPT

Ultra-secure Firefox Offered to UK Bank Users

J. E. Dunn
  • Techworld, February 26
  • 2010
VIEW 1 EXCERPT