SECURITY CONCERNS IN CLOUD COMPUTING
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
http://csrc.nist.gov/groups/SNS/cloudcomputing/index.h tml. [2] Cisco White Paper, http://www.cisco.com/en/US/solutions/collateral/ns341/ ns525/n s537/white_paper_c11-532553.html, published 2009, pp. 1-6. [3] John Viega, McAffee, Cloud Computing and the Common Man,†published on the IEEE Journal ON Cloud Computing Security, pp. 106-108, August 2009. [4] George Reese, “Cloud Application Architecturesâ€, First edition, O’Reilly Media, April 2009, ISBN 9780596156367, pp. 2-4, 99-118. [5] http://en.wikipedia.org/wiki/Cloud_computing. [6] http://communication.howstuffworks.com/cloudcomputi ng1.htm. John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in the World of Cloud Computing,†published on the IEEE Journal on Cloud Computing Security, July/August 2009, Vol. 7, No.4, 61-64. [7] John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and Securityâ€, CRC Press, August 17, 2009, ISBN 9781439806807, pp. 147-158, 183-212. [8] Amazon White Paper, http://aws.amazon.com/aboutaws/whats-new/2009/06/08/new-aws-security-centerand-security-whitepaper/ , published June 2009. [9] Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer, “ Retaining Data Control to the Client Infrastructure Cloudsâ€, published on the IEEE, 2009 International Conference on Availability, Reliability and Security, pp. 9-15. [10] David Bernstein, Erik Ludvigson, Krishna Sankar, Steve Diamond, Monique Morrow, “Blueprint for the Intercloud – Protocols and Formats for Cloud Computing Interoperability, submitted to IEEE, 2009 Fourth International Conference on Internet and Web Applications and Services, pp. 328-335. [11] Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open Architectureâ€, published on IEEE, 2009 IEEE International Conference on Web Services, pp. 607-615. [12] Amazon White Paper, “Introduction to Amazon Virtual Private Cloudâ€, Available: http://aws.amazon.com/about-aws/whatsnew/2009/08/26/introducing-amazon-virtual-privatecloud/ , published Aug 26, 2009, pp. 6-8. [13] Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilitiesâ€, grid Computing and Distributed Systems and Software Engineering, The University of Melbourne, Australia. [14] Jinesh Varia, Amazon Web Services, “Building GrepTheWeb in the Cloud, Part 1: Cloud Architecturesâ€, Available: http://developer.amazonwebservices.com/connect, July 2008, pp 1-7. [15] Jon Brodkin, “ Gartner: Seven Cloud-Computing Security Risksâ€, Available: http://www.infoworld.com, published July 2008, pp. 1-3. [16] IBM CIO White Paper, “ Staying aloft in tough timesâ€, April 2009, pp. 3-19. [17] Steve Hanna, Juniper Networks, “Cloud Computing: Finding the Silver Liningâ€, published 2009, pp. 2-30. [18] Manifesto, “Open Cloud Manifesto, Dedicated to the belief that the cloud should be openâ€, Available: www.opencloudmanifesto.org, published Spring 2009, pp-1-7. [19] Peter Fingar, “ Dot.Cloud: the 21st century business platform built on cloud computingâ€, First edition, Meghan-Kiffer Press, February 18, 2009, ISBN 9780929652498, pp. 81-99.