Review of Potential Threats on Cloud Computing
Keywords:
DLP, SaaS, Cloud, GridAbstract
Cloud Computing is the evolution, over the past 20+ years, of a continuous trend towards the industrialization of IT. This is in part due to the popularity of outsourcing and hosting of increasingly industrialized service definitions and cost structures & pricing. This has also spurred dramatic growth in popularity and use of both internet and corporate wide intranets as trusted delivery models. But are they safe and secure for storing confidential information? How can we make sure that the client has total control over their data on the cloud? Is it true that in order to reduce the cost of operation and efficiency, we have to comprising giving away sensitive data? This paper does an in-depth study of the recurring vulnerabilities.
References
http://www.cio.com/article/680673/Forrester_Public_Cloud_Growth_to_Surge_Especially_SaaS.
E. Brown, ―NIST issues cloud computing guidelines for managing security and privacy,‖ National Institute of Standards and Technology Special Publication 800-144, January 2012.
Security Guidance for Critical Areas in Cloud Security by Cloud Security Alliance Available: https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf
―Top threats to cloud computing,‖ in Cloud Security Alliance, 2013.
Cloud Security Alliance. (2010). Top Threats to Cloud Computing (V2.0). Available: https://cloudsecurityalliance.org/topthreats/csathreats.v2.0.pdf
http://readwrite.com/2010/09/16/googles-internal-security-brea - Google Lawsuit and the trust in cloud.
Privacy in the Cloud: Google Lawsuits, Facebook Data Breach, NSA Leaks - http://blog.malwarebytes.org/whats-in-the-news/2013/06/privacy-in-the-cloud-google-lawsuits-facebook-data-breach-nsa-leaks/
Lightning strikes Amazon cloud (honest). Available: http://www.theregister.co.uk/2009/06/12/lightning_strikes_amazon_cloud/
Catastrophic Hardware Failure at Swissdisk http://www.theregister.co.uk/2009/10/19/swissdisk_failure/.
P. M. a. T. Grance, Effectively and Securely Using the Cloud Computing Paradigm (V0. 25), US National Institute of Standards and Technology, 2009.
Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and Privacy in Cloud Computing: A Survey. Proceedings IEEE Sixth International Conference on Semantics, Knowledge and Grids 2010:106-112
NIST Recommended Security Controls for Federal Information Systems (SP800-53)
NIST SP 800-30 Risk Management Guide for Information Technology Systems
OATH- http://www.openauthentication.org
Justify Identity Management Investment with Metrics, by Roberta J. Witty, Kris Brittain and Ant
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.