Abstract
This short chapter introduces a general list of recommendations for enhancing cloud security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
H. Osman, Smbs that embrace cloud enjoy more revenue: Myob, http://goo.gl/nRMsK0. Accessed 03 April 2016
T. Bindi, Smbs losing billions due to ineffective it management, http://www.dynamicbusiness.com.au/news/smbs-losing-billions-due-to-ineffective-it-management-24042013.html. Accessed 03 April 2016
A. Buecker, K. Lodewijkx, H. Moss, K. Skapinetz, M. Waidner, Cloud security guidance ibm recommendations for the implementation of cloud security. IBM Redpaper (2009)
S. Yu, R. Doss, W. Zhou, S. Guo, A general cloud firewall framework with dynamic resource allocation, in 2013 IEEE International Conference on Communications (ICC) (IEEE, New York, 2013), pp. 1941–1945
N. Robinson, L. Valeri, J. Cave, T. Starkey, H. Graux, S. Creese, P. Hopkins, The cloud: understanding the security, privacy and trust challenges. Rand Corporation (2011)
L. Bilge, T. Dumitras, Before we knew it: an empirical study of zero-day attacks in the real world, in Proceedings of the 2012 ACM Conference on Computer and Communications Security, (ACM, New York, 2012), pp. 833–844
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A.V. Vasilakos, Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
X. He, T. Chomsiri, P. Nanda, Z. Tan, Improving cloud network security using the tree-rule firewall. Future Gener. Comput. Syst. 30, 116–126 (2014)
S. Koushik, A.P. Patil, Open security system for cloud architecture, in ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India, vol I (Springer, Heidelberg, 2014), pp. 467–471
V.J. Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics (Elsevier, Amsterdam, 2011)
H. Xiangyi, M. Zhanguo, L. Yu, The research of the cloud security architecture, in Instrumentation, Measurement, Circuits and Systems (Springer, Heidelberg, 2012), pp. 379–385
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Alani, M.M. (2016). General Cloud Security Recommendations. In: Elements of Cloud Computing Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-41411-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-41411-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41410-2
Online ISBN: 978-3-319-41411-9
eBook Packages: Computer ScienceComputer Science (R0)