ABSTRACT
In recent years, Cloud Computing has gained remarkable popularity due to the economic and technical benefits provided by this new way of delivering computing resources. Businesses can offload their IT infrastructure into the cloud and benefit from rapid provisioning, scalability, and cost advantages. While cloud computing can be implemented on different abstraction levels, we focus on Infrastructure Clouds such as Amazon EC2 [1] that provide virtual machines, storage, and networks.
- Amazon. The Amazon Elastic Compute Cloud (EC2). Available at http://aws.amazon.com/ec2/, last accessed March 2010, 2010.Google Scholar
- Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing, December 2009.Google Scholar
- ENISA. Cloud Computing Risk Assessment. Tech. rep., ENISA, 2009.Google Scholar
- Mell, P., and Grance, T. Effectively and Securely Using the Cloud Computing Paradigm, October 2009.Google Scholar
- Rocha, F., and Correia, M. Lucy in the sky without diamonds: Stealing confidential data in the cloud. In Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV, with DSN'11) (June 2011). Google ScholarDigital Library
- Saltzer, J. H., and Schroeder, M. D. The protection of information in computer system. Proceedings of the IEEE 63, 9 (1975), 1278--1308.Google ScholarCross Ref
- Santos, N., Gummadi, K. P., and Rodrigues, R. Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing (Berkeley, CA, USA, 2009), HotCloud'09, USENIX Association, pp. 3--3. Google ScholarDigital Library
- Weisman, R. Dark Data Center Design. Processor Vol. 28 Issue 35, Sep 2006.Google Scholar
Index Terms
- Secure cloud maintenance: protecting workloads against insider attacks
Recommendations
Cloud service engineering
ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2Building on compute and storage virtualization, Cloud Computing provides scalable, network-centric, abstracted IT infrastructure, platforms, and applications as on-demand services that are billed by consumption. Cloud Service Engineering is the ...
Towards Secure Cloud Bursting, Brokerage and Aggregation
ECOWS '10: Proceedings of the 2010 Eighth IEEE European Conference on Web ServicesThe cloud based delivery model for IT resources is revolutionizing the IT industry. Despite the marketing hype around “the cloud”, the paradigm itself is in a critical transition state from the laboratories to mass market. Many technical and business ...
Towards secure mobile cloud computing: A survey
Mobile cloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobile cloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total ...
Comments