Cloud Computing: Exploring Security Design Approaches in Infrastructure as a Service

被引:0
作者
Jog, Manas [1 ]
Madiajagan, M. [1 ]
机构
[1] BITS Pilani Dubai Campus, Dept Comp Sci, Dubai, U Arab Emirates
来源
2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM) | 2012年
关键词
Cloud Computing; Cloud Security; security design approaches; data privacy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a new paradigm that promises to provide businesses with an IT infrastructure that is flexible, inexpensive and easy to use. Despite such promises, cloud computing has not been adopted at a pace that was expected. Among various reasons that prevent its widespread adoption, the most serious issue that Cloud Computing faces concerns its inability to insure data privacy and confidentiality. The fact that the security challenges faced by the Cloud depend on its deployment model as well as delivery model has further aggravated this problem. Hence we need to develop unique solutions to address security risks at various levels in Cloud Computing. This paper presents a survey on the various types of technologies and architectures that seek to achieve trusted cloud computing at Infrastructure as a Service (IaaS) level.
引用
收藏
页码:156 / 159
页数:4
相关论文
共 10 条
  • [1] Anderson, 2003, 22 ACM S PRINC DISTR
  • [2] [Anonymous], 2009, HOTCLOUD
  • [3] Brodkin J., 2008, INFOWORLD
  • [4] Cloud Security Alliance, 2012, SEC GUID CRIT AR FOC
  • [5] Garfinkel T., 2003, Operating Systems Review, V37, P193, DOI 10.1145/1165389.945464
  • [6] North Bridge, 2012, 2012 CLOUD COMP SURV
  • [7] Ramgovind S., 2010, INFORM SECURITY S AF, P1
  • [8] Santos N., 2012, USENIX Security
  • [9] TCG, 2012, CLOUD COMP SEC NAT M
  • [10] Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    Yu, Shucheng
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,