Security in the cloud

@article{Anthes2010SecurityIT,
  title={Security in the cloud},
  author={Gary Anthes},
  journal={Communications of the ACM},
  year={2010},
  volume={53},
  pages={16 - 18}
}
  • G. Anthes
  • Published 1 November 2010
  • Computer Science
  • Communications of the ACM
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions. 

Cloud Security Challenges

TLDR
This paper shall discuss security concerns in Cloud Computing, Hypervisor, Intrusion Detection, and suggest some measures to improve security.

Security Concerns on Adoption of Cloud Computing

This project aims to investigate the status of cloud computing among business and government organizations, and to understand the security concerns of organizations regarding the adoption of cloud.

Security based Optimizing Design to Migrate Cloud

TLDR
The on-demand use, high scalability, and low maintenance cost nature of cloud computing have attracted more and more enterprises to migrate their legacy applications to the cloud environment, but ensuring high quality of service remains one of the major concerns.

A Proposed Secure Framework for Safe Data Transmission in Private Cloud

TLDR
This research paper helps in protecting the data from unauthorized entries into the server, the data is secured in server, based on users' choice of security method, so that data is given high secure priority without affecting the lower layer.

Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives

TLDR
The mechanisms for security of cloud computing with special attention paid to aspects of access control in clouds - the state of the art and the perspectives for the future are presented.

An Approach for Secure Data Transmission in Private Cloud

TLDR
This research paper helps in securing the data without affecting the network layers and protecting the data from unauthorized entries into the server based on users' choice of security method so that data is given high secure priority.

A Survey Paper on Designing Multi Cloud Server for Scalable and Secure Sharing over Web

TLDR
The different encryption algorithms that can be used to maintain a design framework for cloud environment and a way to provide better security in multi-cloud environment are discussed.

A Survey on Security of Cloud Computing

TLDR
This survey paper introduces a detailed analysis about attacks that are exacerbated by exploitation of the cloud system along with possible solutions.

A Survey on Security of Cloud Computing

TLDR
This survey paper introduces a detailed analysis about attacks that are exacerbated by exploitation of the cloud system along with possible solutions.

A SURVEY ON DESIGNING CLOUD SERVER SECURE SHARING OVER THE WEB

TLDR
T provides a way to provide better security in cloud environment and discusses the different encryption algorithms that can be used to maintain a design framework for cloud environmen.
...

References

SHOWING 1-4 OF 4 REFERENCES

Cryptographic Cloud Storage

We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high

Cloud security is not (just) virtualization security: a short paper

TLDR
This work presents a solution that is highly scalable, centralizes guest protection into a security VM, supports Linux and Windows operating systems and can be easily extended to support new operating systems, and does not assume any a-priori semantic knowledge of the guest.

Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds

TLDR
It is shown that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target, and how such placement can then be used to mount cross-VM side-channel attacks to extract information from a target VM on the same machine.

Fully homomorphic encryption using ideal lattices

TLDR
This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.