scispace - formally typeset

Cloud computing security

About: Cloud computing security is a(n) research topic. Over the lifetime, 27155 publication(s) have been published within this topic receiving 511823 citation(s). The topic is also known as: Cloud security. more


Journal ArticleDOI: 10.1016/J.FUTURE.2008.12.001
Rajkumar Buyya1, Chee Shin Yeo1, Srikumar Venugopal1, James Broberg1  +1 moreInstitutions (2)
Abstract: With the significant advances in Information and Communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing utilities, will provide the basic level of computing service that is considered essential to meet the everyday needs of the general community. To deliver this vision, a number of computing paradigms have been proposed, of which the latest one is known as Cloud computing. Hence, in this paper, we define Cloud computing and provide the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs). We also provide insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA)-oriented resource allocation. In addition, we reveal our early thoughts on interconnecting Clouds for dynamically creating global Cloud exchanges and markets. Then, we present some representative Cloud platforms, especially those developed in industries, along with our current work towards realizing market-oriented resource allocation of Clouds as realized in Aneka enterprise Cloud technology. Furthermore, we highlight the difference between High Performance Computing (HPC) workload and Internet-based services workload. We also describe a meta-negotiation infrastructure to establish global Cloud exchanges and markets, and illustrate a case study of harnessing 'Storage Clouds' for high performance content delivery. Finally, we conclude with the need for convergence of competing IT paradigms to deliver our 21st century vision. more

Topics: Utility computing (68%), Cloud computing (67%), Cloud computing security (63%) more

5,544 Citations

Open accessBook
19 Aug 1998-
Abstract: William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues. more

Topics: Network security policy (65%), Security service (64%), Network Access Control (63%) more

3,643 Citations

Open accessJournal ArticleDOI: 10.1007/S13174-010-0007-6
Qi Zhang1, Lu Cheng1, Raouf Boutaba1Institutions (1)
Abstract: Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the fact that cloud computing offers huge opportunities to the IT industry, the development of cloud computing technology is currently at its infancy, with many issues still to be addressed. In this paper, we present a survey of cloud computing, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges. The aim of this paper is to provide a better understanding of the design challenges of cloud computing and identify important research directions in this increasingly important area. more

Topics: Cloud computing (70%), Cloud computing security (68%), Utility computing (68%) more

3,273 Citations

Open accessBook
01 Jun 1998-
Topics: Network Access Control (66%), Network security policy (65%), Security service (65%) more

2,623 Citations

Journal ArticleDOI: 10.1016/J.JNCA.2010.07.006
S. Subashini1, V. Kavitha1Institutions (1)
Abstract: Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology's (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. more

Topics: Cloud computing security (77%), Cloud computing (68%), Information privacy (52%) more

2,387 Citations

No. of papers in the topic in previous years

Top Attributes

Show by:

Topic's top 5 most impactful authors

Massimiliano Rak

27 papers, 397 citations

Eduardo Fernández-Medina

23 papers, 414 citations

Fred Cohen

20 papers, 79 citations

Valentina Casola

19 papers, 274 citations

Steven Furnell

18 papers, 571 citations

Network Information
Related Topics (5)
Computer security model

18.1K papers, 352.9K citations

94% related
Access control

32.6K papers, 475K citations

94% related
Information security

25.2K papers, 327.7K citations

93% related
Intrusion detection system

28.4K papers, 509.5K citations

93% related
Network security

23.9K papers, 349.5K citations

93% related