Advertisement

Cloud Infrastructure Security

  • Dimiter Velev
  • Plamena Zlateva
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6555)

Abstract

Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professionals define the security rules, guidelines and best practices of the IT infrastructure of a given organization at the network, host and application levels. The current paper discusses miscellaneous problems of providing the infrastructure security. The different aspects of data security are given a special attention, especially data and its security. The main components of cloud infrastructure security are defined and the corresponding issues and recommendations are given.

Keywords

cloud service infrastructure IaaS security data 

References

  1. 1.
  2. 2.
    Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives. An ISACA Emerging Technology White Paper, http://www.isaca.org
  3. 3.
    Dhanjani, N., Rios, B., Hardi, B.: acking: The Next Generation. HO’Reilly Media, Inc., Sebastopol (2009)Google Scholar
  4. 4.
    ENISA.: Cloud Computing: Information Assurance Framework. ENISA (November 2009), http://www.enisa.europa.eu/
  5. 5.
    ENISA.: Cloud Computing: Benefits, risks and recommendations for information security. ENISA (November 2009), http://www.enisa.europa.eu/
  6. 6.
    Lyong, L.: How to Select a Cloud Computing Infrastructure Provider. Gartner, Inc. Research. ID Number: G00166565Google Scholar
  7. 7.
    Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Inc., Sebastopol (2009)Google Scholar
  8. 8.
    Owens, K.: Securing Virtual Compute Infrastructure in the Cloud. White Paper: Cloud Computing, http://www.savvis.net
  9. 9.
    Reese, G.: Cloud Application Architectures: Building Applications and Infrastructure in the Cloud. O’Reilly Media, Inc., Sebastopol (2009)Google Scholar
  10. 10.
    Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management and Security. CRC Press, Boca Raton (2009)Google Scholar
  11. 11.
    Secure Cloud Architecture, NetApp, WP-7083-0809 (August 2009)Google Scholar
  12. 12.
    Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance (2009), http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
  13. 13.
    Securing Microsoft’s Cloud Infrastructure. A Microsoft White Paper, http://blogs.technet.com/gfs/archive/2009/05/27/securing-microsoft-s-cloud-infrastructure.aspx
  14. 14.
    The Role of Security in Trustworthy Cloud Computing. RSA, White paper, http://www.rsa.com

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Dimiter Velev
    • 1
  • Plamena Zlateva
    • 2
  1. 1.University of National and World Economy, UNSS - Studentski gradSofiaBulgaria
  2. 2.Institute of Control and System ResearchBulgarian Academy of SciencesSofiaBulgaria

Personalised recommendations