Open Access
Subscription Access
Open Access
Subscription Access
Outlining Imminent Areas and Possible Schemes of Cloud Security
Subscribe/Renew Journal
Cloud computing derives from a long history of research and development on various approaches to IT outsourcing, in which customers draw from a utility provider’s pool of capacity on a pay-as you-go basis as an alternative to operating their own infrastructure. While many of the predictions may be cloud hype, we believe the new IT procurement model offered by cloud computing is here to stay . Brushing aside the services offered, however, security is a huge concern for cloud users. Cloud fears largely stem from the perceived loss of control of sensitive data. Current control measures do not adequately address cloud computing third-party data storage and processing needs. In our vision, we propose to extend control measures from the enterprise into the cloud through the use of Trusted Computing and applied cryptographic techniques. These measures should alleviate much of today’s fear of cloud computing, and, we believe, have the potential to provide demonstrable business intelligence advantages to cloud participation. Our vision also relates to likely problems and abuses arising from a greater reliance on cloud computing, and how to maintain security in the face of such attacks. Namely, the new threats require new constructions to maintain and improve security. Among these are tools to control and understand privacy leaks, perform authentication, and guarantee availability in the face of cloud denial-of-service attacks.
Keywords
Cloud, Privacy, Security, Trusted Computing.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 229
PDF Views: 1