Cloud computing privacy & security global issues, challenges, & mechanisms

Cloud computing is a developing archetype with marvelous momentum, but its exceptional aspects worsening the security and privacy challenges. This article provides an overview of the security and privacy challenges pertinent to public cloud computing and points out considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment. We have also proposed a security mechanism “security as a service” for cloud computing. It also explores the roadblocks and solutions to providing a trustworthy cloud computing environment.

[1]  Wei Zhao An Initial Review of Cloud Computing Services Research Development , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[2]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[3]  Feng Liu,et al.  SaaS Integration for Software Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[4]  Leon Gommans,et al.  Multi-domain lightpath authorization, using tokens , 2009, Future Gener. Comput. Syst..

[5]  Cees T. A. M. de Laat,et al.  XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.

[6]  Antonio Puliafito,et al.  Security and Cloud Computing: InterCloud Identity Management Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[7]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.

[8]  Li Mei,et al.  The analisis of Gis software engineering pattern under the cloud computing environment , 2010, 2010 International Conference on Educational and Information Technology.

[9]  Jinzhu Kong Protecting the Confidentiality of Virtual Machines Against Untrusted Host , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[10]  Bharat Rao,et al.  The emergence and promise of cloud computing for under-developed societies , 2010, PICMET 2010 TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH.

[11]  Liang-Jie Zhang,et al.  CCOA: Cloud Computing Open Architecture , 2009, 2009 IEEE International Conference on Web Services.