Cloud Computing Security

In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand' computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently present within the cloud computing industry.

[1]  J. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[2]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[3]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[4]  Tim Mather,et al.  Cloud security and privacy , 2009 .

[5]  Rao Mikkilineni,et al.  Cloud Computing and the Lessons from the Past , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[6]  Anders Eriksson,et al.  What Networking of Information Can Do for Cloud Computing , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[7]  Paul Mcfredries,et al.  Technically speaking: The cloud is the computer , 2008 .

[8]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[9]  S. Mendelson,et al.  Uniform Uncertainty Principle for Bernoulli and Subgaussian Ensembles , 2006, math/0608665.

[10]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[11]  Ramesh Govindan,et al.  Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.

[12]  Doug Johnson,et al.  Computing in the Clouds. , 2010 .

[13]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .