Skip to main content

State of the Art of Network Security Perspectives in Cloud Computing

  • Conference paper
Security-Enriched Urban Computing and Smart Grid (SUComS 2010)

Abstract

Cloud computing is now regarded as one of social phenomenon that satisfy customers’ needs. It is possible that the customers’ needs and the primary principle of economy – gain maximum benefits from minimum investment – reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user’s environment based on the customer’s needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kimball, A., Michels-Slettvet, S., Biscigilia, C.: Cluster Computing for Web-Scale Data Processing. In: SIGCSE 2008, Portland, Oregon, pp. 116–120 (2008)

    Google Scholar 

  2. Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing

  3. Vision, Hype, and Reliability for Delivering IT Services as Computing Utilities, HPCC 2008 Keynote (2008)

    Google Scholar 

  4. Thomas, D.: Enabling Application Agility-Software as a Service, Cloud Computing and Dynamic Languages. Journal of Object Technology 17(4) (May-June 2008)

    Google Scholar 

  5. Lawton, G.: Developing Software Online with Platform-as-a-Service Technology. Computer (June 2008)

    Google Scholar 

  6. Armbrust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing (February 2009), http://radlab.cs.berkeley.edu

  7. Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2

  8. Amazon Simple Storage Service (Amazon S3), http://aws.amazon.com/s3

  9. Valdes, R.: Google App Engine Goes Up Against Amazon Web Services. Gartners (April 2008)

    Google Scholar 

  10. Mitchell, A.: Google Apps: Education Edition Overview Webinar, http://www.google.com

  11. Cloud Security Alliance, http://cloudsecurityalliance.org/

  12. Open Cloud Consortium, http://opencloudconsortium.org/

  13. Storage Networking Industry Association, http://www.snia.org/home/

  14. European Network & Information Security Agency (ENISA), http://www.enisa.europa.eu/

  15. National Institute of Standards and Technology, Computer Security Resource Center, http://csrc.nist.gov/groups/SNS/cloud-computing/

  16. Andrei, T., Jain, R.: Cloud Computing Challenges and Related Security Issues. Project report, Washington University in St. Louis (April 2009)

    Google Scholar 

  17. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Computing Alliance (December 2009)

    Google Scholar 

  18. The Role of Security in Trustworthy Cloud Computing, White Paper, RSA

    Google Scholar 

  19. Brodkin, J.: Gartner: Seven cloud-computing security risks (July 2, 2008), http://www.infoworld.com

  20. European Network and Information Security Agency (ENISA), Cloud Computing: benefits, risks and recommendations for information security (November 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oh, T.H., Lim, S., B.Choi, Y., Park, KR., Lee, H., Choi, H. (2010). State of the Art of Network Security Perspectives in Cloud Computing. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_79

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16444-6_79

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16443-9

  • Online ISBN: 978-3-642-16444-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics