Abstract
While the emergence of cloud computing has made it possible to rent information technology infrastructures on demand, it has also created new security challenges. The primary security concern is trusting data (or resources in general) on another organization’s system. This document seeks to examine the current state of security in cloud computing and presents a set of challenges to address the security needs of clouds. The end result is a framework to help the design and implementation of effective cloud security infrastructures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Papazoglou, M.: Web Services: Principles and Technology. Prentice Hall, Englewood Cliffs (2008) 978-0321155559
TechTarget (2008) What is server virtualization? Updated (August 14, 2008), http://searchservervirtualization.techtarget.com/sDefinition/0,,sid94_gci1032820,00.html# (accessed August 6, 2009)
Amazon, Amazon Elastic Compute Cloud (2007), http://aws.amazon.com/ec2/ (accessed August 1, 2009)
Google, App Engine (2009), http://code.google.com/appengine/ (accessed February 17, 2009)
Microsoft, Azure (2009), http://www.microsoft.com/azure/default.mspx (accessed May 5, 2009)
Salesforce, CRM - salesforce.com (2009), http://www.salesforce.com/ (accessed)
Ristenpart, T., et al.: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS’09, Chicago, Illinois, November 9-13 (2009)
Brooks, C.: Amazon add onetime password token to entice the wary. Search Cloud Computing (2009), http://searchcloudcomputing.techtarget.com/news/article/0,289142,sid201_gci1367923,00.html# (Updated September 11, 2009, accessed October 8, 2009)
Google, The Deployment Description: web.xml (2009), http://code.google.com/appengine/docs/java/config/webxml.html (accessed November 20, 2009)
Chappell, D.: Introducting the Azure Services Platform, White Paper. David Chappell & Associates (May 2009), http://download.microsoft.com/download/F/C/B/FCB07D64-7D1F-4776-8C65-602C266F71C7/Introducing_Azure_Services_Platform_v1.pdf
Goscinski, A.: Resource Protection. In: Distributed Operating Systems: The Logical Design, pp. 585–649. Addison-Wesley, Reading (1991)
Yuan, E., Tong, J.: Attributed based access control (ABAC) for Web services. In: IEEE International Conference on Web Services, ICWS 2005, Proceedings, p. 569 (2005)
Goscinski, A., Pieprzyk, J.: Security in Distributed Operating Systems. Datenschutz and Datensicherung (5) (1991)
Neuman, C.B., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine 32(I.9), 33–38 (1994)
Brock, M., Goscinski, A.: Attributed Publication and Selection for Web Service-based Distributed Systems. In: Proc. of the 3rd Int. Workshop on Service Intelligence and Computing (SIC 2009) with the 7th IEEE Int. Conf. on Web Services (ICWS 2009), Los Angeles, CA, USA, pp. 732–739 (2009)
Brock, M., Goscinski, A.: A Technology to Expose a Cluster as a Service in a Cloud. In: 8th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2010), Brisbane, Australia (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brock, M., Goscinski, A. (2010). Toward a Framework for Cloud Security. In: Hsu, CH., Yang, L.T., Park, J.H., Yeo, SS. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2010. Lecture Notes in Computer Science, vol 6082. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13136-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-13136-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13135-6
Online ISBN: 978-3-642-13136-3
eBook Packages: Computer ScienceComputer Science (R0)