Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and displacement of data and services from inside to outside the organization. While aspects of these characteristics have been realized to a certain extent, cloud computing remains a work in progress. This publication provides an overview of the security and privacy challenges pertinent to public cloud computing and points out considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.
Cited By
- Bedi R, Singh J and Gupta S (2019). MWC, The Journal of Supercomputing, 75:6, (3264-3287), Online publication date: 1-Jun-2019.
- Mohammad O Recent Trends of Cloud Computing Applications and Services in Medical, Educational, Financial, Library and Agricultural Disciplines Proceedings of the 4th International Conference on Frontiers of Educational Technologies, (132-141)
- Singh S, Jeong Y and Park J (2016). A survey on cloud computing security, Journal of Network and Computer Applications, 75:C, (200-222), Online publication date: 1-Nov-2016.
- Silva K, Rocha A and Guimaraes F Trust in the Cloud from the Sec- SLA construction in various models as deployment and service Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (329-336)
- Cerbo F and Trabelsi S Re-Identification Risk Based Security Controls Proceedings of the Confederated International Workshops on On the Move to Meaningful Internet Systems: OTM 2014 Workshops - Volume 8842, (99-107)
- Paladi N, Gehrmann C and Morenius F Domain-Based Storage Protection DBSP in Public Infrastructure Clouds Proceedings of the 18th Nordic Conference on Secure IT Systems - Volume 8208, (279-296)
- Samanthula B, Howser G, Elmehdwi Y and Madria S An efficient and secure data sharing framework using homomorphic encryption in the cloud Proceedings of the 1st International Workshop on Cloud Intelligence, (1-8)
Recommendations
Cloud Computing Security: Amazon Web Service
ACCT '15: Proceedings of the 2015 Fifth International Conference on Advanced Computing & Communication TechnologiesCloud Computing is a recently emerged model which is becoming popular among almost all enterprises. It involves the concept of on demand services which means using the cloud resources on demand and we can scale the resources as per demand. Cloud ...
Security, Privacy Issues and challenges In Cloud Computing: A Survey
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesCloud computing is a rising paradigm for large scale infrastructures. Cloud computing is a technology that being hugely adopted by many organizations like Google, Microsoft, Facebook, Amazon so that the resources are available to multiple users at a ...