Identification of Critical Security Issues for Cloud Computing

Article Preview

Abstract:

Cloud computing is a new service style with many significant advantages and becoming a trend in the world nowadays. Although cloud computing can provide many significant advantages, it also brings us new security problems which present strong barriers for individuals/enterprises to adapt into cloud computing. Including European Network and Information Security Agency (ENISA), many international organizations have issued their reports on the issue of cloud computing security. However, the identification of risks the cloud computing faces also mix with traditional security problems. In this paper, we aim at identifying the critical security issues which are cloud computing-designated. The results of our identification are divided into three categories, namely, policy and organizational, technical, and legal issues, which were adopted by ENISA. We also carefully analyzed the literature on cloud computing security to identify critical cloud computing-designated risk items for each category. Detailed explanations about how the risk items were identified as the critical cloud computing-designated ones are also given to show the adequacy of the proposed identifications. Most of the cloud computing-designated security issues pointed out in this paper is still open and can be taken into consideration for cloud computing service providers when designing a new cloud computing technique.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

272-276

Citation:

Online since:

December 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Information on http: /en. wikipedia. org/wiki/Client%E2%80%93server_model.

Google Scholar

[2] Information on http: /tw. myblog. yahoo. com/jw!U84Tuo2BBRlYlxPgRVk2uqDgEZY6/article?mid=170.

Google Scholar

[3] Information on http: /www. melbpc. org. au/pcupdate/9908/9908article8. htm.

Google Scholar

[4] Information on http: /en. wikipedia. org/wiki/Distributed_computing.

Google Scholar

[5] Information on http: /www. chinacloud. cn.

Google Scholar

[6] Information on http: /www. hadoop. tw/2010/07/trend-of-cloud-and-the-rising-hadoop. html.

Google Scholar

[7] Information on http: /www. eettaiwan. com.

Google Scholar

[8] Cloud Security Alliance, Top Threats to Cloud Computing V1. 0, edited by Cloud Security Alliance, U.S.A. (2010).

Google Scholar

[9] Information on http: /Blogs. idc. com/ie/?p=370.

Google Scholar

[10] M. Peter, and G. Tim, in: The NIST Definition of Cloud Computing, edited by National Institute of Standards and Technology (NIST), U.S.A. (2009).

Google Scholar

[11] Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2. 1, edited by Cloud Security Alliance, U.S.A. (2009).

DOI: 10.1016/b978-0-12-420125-5.09002-6

Google Scholar

[12] Information on http: /www. infoworld. com/d/security-central/gartner-seven-cloud-computing-security-risks-853.

Google Scholar

[13] Information on http: /www. csoonline. com/article/496388/forrester-a-close-look-at-cloud-computing-security-issues?page=1.

Google Scholar

[14] W. A. Jansen: Cloud Hooks: Security and Privacy Issues in Cloud Computing (44th Hawaii International Conference on System Sciences, U.S. A 2011).

DOI: 10.1109/hicss.2011.103

Google Scholar

[15] C. Daniele, and H. Giles, in: Cloud Computing Benefit, risk and recommendations for information security, edited by ENISA, E. U (2009), in press.

Google Scholar

[16] S.Z. Li, Y.S. Li, and S.J. Zhuang: Cloud computing security threats faced by the risk assessment (in Chinese) (CIAIST, Taiwan 2010).

Google Scholar

[17] X. LChen, and Z.T. Huang: Cloud computing services risk assessment (in Chinese) (ECDL, Taiwan 2011).

Google Scholar