Weitere Kapitel dieses Buchs durch Wischen aufrufen
Evolution in Information Technology has introduced Cloud Computing as a new technology that refers to resource virtualization. Cloud Computing involves storing and accessing data and developing and managing applications over the Internet. Despite the many advantages of the specific technology, such as the availability of stored data, cost and time saving and scalability, security and privacy are considered critical factors in Cloud Computing. This chapter’s main target is to present and discuss privacy and confidentiality issues in Cloud Computing. Some of the many challenges faced are security threats regarding managing sensitive data and vulnerabilities in the virtualized environment and network security. The methodology used, in order to demonstrate these issues, is by using a virtualized environment and software automation tools. The remote hosts are configured within the cloud in order to be secured.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing, recommendations of the National Institute of Standards and Technology (NIST Special Publication 800-145. P 2,3).
Chauhan, M. A., Babar, M. A., & Benetallah, B. (2016). Architecting cloud-enabled systems: A systematic survey of challenges and solutions. p. 1. doi: 10.1002/spe.2409
Bulusu, S., & Sudia, K. (2012. A study on cloud computing security challenges (pp. 7–9). Dissertation, School of Computing Blekinge Institute of Technology, Sweden.
Popovic, K., & Hocenski, Z. (2010). Cloud computing security issues and challenges. In MIPRO, 2010 Proceedings of the 33rd International Convention.
Rastogi, N., Gloria, M. J. K., & Hendler, J. (2015). Security and privacy of performing data analytics in the cloud: A three-way handshake of technology, policy, and management. Journal of Information Policy, 5, 133–142. CrossRef
Shrivastava, N., & Yadav, R. (2013). A review of cloud computing security issues. International Journal of Engineering and Innovative Technology, 3(1), 551.
Albeshri, A., Ahmad, A., & Caelli, W. (2010, September, 1–3). Mutual protection in a cloud computing environment. In IEEE 12th international conference on high performance computing and communications (HPCC 2010) (p. 641), Melbourne.
Swanson, M., & Guttman, B. (1996). Computer security. generally accepted principles and practices for securing information technology systems (NIST Special Publication 800-14). p. 3.
Mahmood, Z. (Ed.). (2014). Cloud computing challenges, limitations and R&D solutions (p. 5, 8–18). Heidelberg: Springer.
Antonopoulos, N., & Gillam, L. (Eds.). (2010). Cloud computing principles, systems and applications (p. 31). Heidelberg: Springer. MATH
Song, D. X., Wanger, D., & Tian, X. (2001, August 13–17). Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the10th USENIX security symposium (p. 5). Washington, DC.
Sklavos, N. (2011, April 6–8). Cryptographic algorithms on a chip: Architectures, designs and implementation platforms. In Proceedings of the 6th Design and Technology of Integrated Systems in Nano Era (DTIS’11), Greece.
Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009, September 21–25). On technical security issues in cloud computing. In Proceedings of the 2009 IEEE international conference on cloud computing(CLOUD ’09) (pp. 109–116), Bangalore.
Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance web security. International Journal of innovative and Emerging Research in Engineering, 2(1), 77.
Selvi, V., Sankar, R., & Umarani, R. (2014). The design and implementation of on-line examination using firewall security. IOSR Journal of Computer Engineering, 16(6), 21. CrossRef
Sklavos, N., & Souras, P. (2006). Economic models and approaches in information security for computer networks. International Journal of Network Security, 2(1), 14–20.
- Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts
- Chapter 31