Security Analysis of Cloud Computing

This paper produces a baseline security analysis of the Cloud Computing Operational Environment in terms of threats, vulnerabilities and impacts. An analysis is conducted and the top three threats are identified with recommendations for practitioners. The conclusion of the analysis is that the most serious threats are non-technical and can be solved via management processes rather than technical countermeasures

[1]  Jennifer L. Bayuk Cloud security metrics , 2011, 2011 6th International Conference on System of Systems Engineering.

[2]  Tao Zhang,et al.  Research of electric power information security protection on cloud security , 2010, 2010 International Conference on Power System Technology.

[3]  Zhang Fengxiang,et al.  International Conference on Power System Technology , 1991 .

[4]  Myong H. Kang,et al.  Security and Architectural Issues for National Security Cloud Computing , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[5]  Xin Wang,et al.  Research on the anti-virus system of military network based on cloud security , 2010, 2010 International Conference on Intelligent Computing and Integrated Systems.

[6]  Vivek Kundra,et al.  25 Point Implementation Plan to Reform Federal Information Technology Management , 2010 .

[7]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[8]  Amani S. Ibrahim,et al.  Collaboration-Based Cloud Computing Security Management Framework , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[9]  Yochai Benkler,et al.  Overcoming Agoraphobia: Building the Commons of the Digitally Networked Environment , 2002 .

[10]  Mario Golling,et al.  Security Management Areas in the Inter-cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[11]  James P. Durbano,et al.  Securing the Cloud , 2010, Cloud Computing.

[12]  Tim Mather,et al.  Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.

[13]  Karen A. Scarfone,et al.  Guide to Security for Full Virtualization Technologies , 2011 .

[14]  Jannette Huberts,et al.  Library of Congress. Congressional Research Service , 2016 .

[15]  M. Roberts Masillamani,et al.  Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.

[16]  Michael Kretzschmar,et al.  Security management interoperability challenges for Collaborative Clouds , 2010, 2010 4th International DMTF Academic Alliance Workshop on Systems and Virtualization Management.

[17]  Bo Ai,et al.  The issues of cloud computing security in high-speed railway , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[18]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[19]  Vivek Kundra,et al.  Federal Cloud Computing Strategy , 2011 .

[20]  Ben Walters,et al.  QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[21]  Matthew Metheny,et al.  Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.