Service Availability in Cloud Computing : Threats and Best Practices

Cloud computing provides access to on-demand computing resources and storage space, whereby applications and data are hosted with data centers managed by third parties, on a pay-per-use price model ...

[1]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[2]  Kim-Kwang Raymond Choo Cloud computing: Challenges and future directions , 2010 .

[3]  A. Zahariev Google App Engine , 2009 .

[4]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[5]  Eric Bauer,et al.  Reliability and Availability of Cloud Computing , 2012 .

[6]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[7]  J McNally,et al.  Information Security Standards , 2011 .

[8]  Wasim A. Al-Hamdani,et al.  Who can you trust in the cloud?: a review of security issues within cloud computing , 2011, InfoSecCD.

[9]  Pankesh Patel,et al.  Service Level Agreement in Cloud Computing , 2009 .

[10]  Eric Bauer,et al.  Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems , 2011 .

[11]  Qijun Gu,et al.  Denial of Service Attacks , 2012 .

[12]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[13]  Eugene Ciurana,et al.  Google App Engine , 2009 .

[14]  Imad M. Abbadi,et al.  Self−Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure , 2011 .

[15]  Edward Roback,et al.  SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .

[16]  Mark S. Young,et al.  The Field Guide to Understanding Human Error , 2008 .

[17]  Fang Liu,et al.  NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.

[18]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[19]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[20]  M. A. C. Dekker Critical Cloud Computing. A CIIP perspective on cloud computing services , 2013 .

[21]  Joseph W. Yoder,et al.  Architectural Patterns for Enabling Application Security , 1998 .

[22]  Richard Mc Dougall,et al.  Availability-What It Means , Why It ’ s Important , and How to Improve It , 1997 .

[23]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[24]  Ajey Singh,et al.  Evaluating a cryptographic Overview of Attacks on Cloud Computing , 2012 .