0% found this document useful (0 votes)
84 views8 pages

The Management of Security in Cloud Computing: September 2010

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views8 pages

The Management of Security in Cloud Computing: September 2010

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/224178604

The management of security in Cloud computing

Conference Paper · September 2010


DOI: 10.1109/ISSA.2010.5588290 · Source: IEEE Xplore

CITATIONS READS

357 6,958

3 authors, including:

S. Ramgovind Mm Eloff
University of South Africa University of South Africa
1 PUBLICATION   357 CITATIONS    63 PUBLICATIONS   1,284 CITATIONS   

SEE PROFILE SEE PROFILE

All content following this page was uploaded by S. Ramgovind on 15 September 2014.

The user has requested enhancement of the downloaded file.


The Management of Security in Cloud Computing

Ramgovind S, Eloff MM, Smith E


School of Computing, University of South Africa, Pretoria, South Africa
[email protected]; {eloff, smithe}@unisa.ac.za

Abstract—Cloud computing has elevated IT to newer limits Cloud computing can be seen as a service-oriented
by offering the market environment data storage and capacity architecture (SOA) exploring almost every computing
with flexible scalable computing processing power to match component including, but not limited to distributed computing,
elastic demand and supply, whilst reducing capital expenditure. grid computing, utility computing, on-demand, open source,
However the opportunity cost of the successful implementation of Peer-to-Peer and Web 2.0 [2]. It is a natural next step from the
Cloud computing is to effectively manage the security in the grid model to a supply and demand utility model. In
cloud applications. Security consciousness and concerns arise as minimizing potential security trust issues as well as adhering to
soon as one begins to run applications beyond the designated
governance issues facing Cloud computing, a prerequisite
firewall and move closer towards the public domain. The purpose
control measure is to ensure that a concrete Cloud computing
of the paper is to provide an overall security perspective of Cloud
computing with the aim to highlight the security concerns that
Service Level Agreement (SLA) is put in place and maintained
should be properly addressed and managed to realize the full when dealing with outsourced cloud service providers and
potential of Cloud computing. Gartner’s list on cloud security specialised cloud vendors. Due to the nature and demand of
issues, as well the findings from the International Data emerging cloud technologies, there is a certain degree of
Corporation enterprise panel survey based on cloud threats, will inexperience when dealing with cloud security. Currently
be discussed in this paper. Cloud computing clients have to trust 3rd party cloud providers
on many fronts, especially on the availability of cloud service
Keywords- Cloud computing; Security; Public cloud, Private as well as data security. Therefore the SLA forms an integral
cloud, Hybrid Cloud, policies, cloud transparency part of a client’s first line of defense. The SLA thus becomes
I. INTRODUCTION the solitary legal agreement between the service provider and
client. The SLA together with other key Cloud considerations
The success of modern day technologies highly depends on will be unpacked further on in this paper.
its effectiveness of the world’s norms, its ease of use by end
users and most importantly its degree of information security The remainder of this paper is structured as follows:
and control. Cloud computing is a new and emerging Section II introduces the different types of Cloud models also
information technology that changes the way IT architectural known as deployment models together with its security
solutions are put forward by means of moving towards the implications, Section III explains Cloud computing
theme of virtualisation: of data storage, of local networks architectural delivery models with a security insight, followed
(infrastructure) as well as software [1-2]. by Section IV that discusses Cloud computing concerns,
particularly focusing on Gartner’s list on cloud security issues.
In a survey undertaken by the International Data Section V pertains to the information security requirements that
Corporation (IDC) group between 2008 and 2009, the majority are applied to Cloud computing. Section VI unpacks the
of results point to employing Cloud computing as a low-cost findings from the IDC enterprise panel survey based on cloud
viable option to users [3]. The results also show that Cloud shortfalls and finally Section VII highlights how Cloud
computing is best suited for individuals who are seeking a computing security can be managed.
quick solution for startups, such as developers or research
projects and even e-commerce entrepreneurs. Using Cloud II. TYPES OF CLOUDS
computing can help in keeping one’s IT budget to a bare In providing a secure Cloud computing solution, a major
minimum. It is also ideally suited for development and testing decision is to decide on the type of cloud to be implemented.
scenarios. It is the easiest solution to test potential proof of Currently there are three types of cloud deployment models
concepts without investing too much capital. Cloud computing offered, namely, a public, private and hybrid cloud. These,
can deliver a vast array of IT capabilities in real time using together with their security implications will be discussed
many different types of resources such as hardware, software, below. Within this paper vendors are referred to as cloud
virtual storage once logged onto a cloud. Cloud computing can providers, or companies specialising in providing a tailor made
also be part of a broader business solution whereby prioritised cloud solution. These entities have established cloud
applications utilise Cloud computing functionality whilst other infrastructure including virtual servers for storage matching
critical applications maintain organisational resources as per required processing power. Organisations are entities,
normal. This allows for cost saving whilst maintaining a secure including business managers, executives and end-users,
degree of control within an orgainsation. entering into an agreement with cloud vendors to utilise their
cloud capabilities for personal and/or private use.

978-1-4244-5495-2/10/$26.00 ©2010 IEEE


C. Hybrid Cloud
A hybrid cloud is a private cloud linked to one or more
external cloud services, centrally managed, provisioned as a
single unit, and circumscribed by a secure network [6]. It
provides virtual IT solutions through a mix of both public and
private clouds. Hybrid Clouds provide more secure control of
the data and applications and allows various parties to access
information over the Internet. It also has an open architecture
that allows interfaces with other management systems.
To summarise, in the cloud deployment model,
networking, platform, storage, and software infrastructure are
provided as services that scale up or down depending on the
demand [7]. In deciding which type of Cloud to deploy,
business managers’ needs to holistically assess the security
considerations from an enterprise architectural point of view,
taking into account the information security differences of
each Cloud deployment model mentioned above.

III. CLOUD COMPUTING DELIVERY MODELS


Following on the cloud deployment models, the next
security consideration that business management must unpack
A. Public Cloud relates to the various cloud delivery models. Due to the pay-
A public cloud is a model which allows users’ access to the per-use economy model that pertains to Cloud delivery
cloud via interfaces using mainstream web browsers. It’s models, the degree of information security is directed towards
typically based on a pay-per-use model, similar to a prepaid adhering to industry standards and legislations among cloud
electricity metering system which is flexible enough to cater shareholders. The architecture of Cloud computing can be
for spikes in demand for cloud optimisation. This helps cloud categorised according to the three types of delivery models,
clients to better match their IT expenditure at an operational namely Infrastructure as a service (IaaS), Software as a service
level by decreasing its capital expenditure on IT infrastructure
(SaaS) and Platform as a service (PaaS).
[4]. Public clouds are less secure than the other cloud models
because it places an additional burden of ensuring all A. Infrastructure as a Service (IaaS)
applications and data accessed on the public cloud are not Infrastructure as a Service is a single tenant cloud layer
subjected to malicious attacks. Therefore trust and privacy where the Cloud computing vendor’s dedicated resources are
concerns are rife when dealing with Public clouds with the
only shared with contracted clients at a pay-per-use fee. This
Cloud SLA at its core. A key management consideration,
which needs to be answered within the SLA deals with greatly minimizes the need for huge initial investment in
ensuring that ample security controls are put in place. One computing hardware such as servers, networking devices and
option is for both the cloud vendor and client mutually agree in processing power. They also allow varying degrees of
sharing joint responsibility in enforcing cloud checks and financial and functional flexibility not found in internal data
validation are performed across their own systems. The centers or with co-location services, because computing
alternative option will be for each party to set out individual resources can be added or released much more quickly and
roles and responsibilities in dealing with cloud computing cost-effectively than in an internal data center or with a co-
security within their utilization boundaries. location service [9]. However, corporate decision makers must
be aware of the capital outlay shift from a periodic fixed
B. Private Cloud
expense payment reflected on the income statement to an
A private cloud is set up within an organisation’s internal operational expense increase.
enterprise datacenter. It is easier to align with security,
compliance, and regulatory requirements, and provides more B. Software as a Service (SaaS)
enterprise control over deployment and use. In the private Software as a Service also operates on the virtualised and
cloud, scalable resources and virtual applications provided by pay-per-use costing model whereby software applications are
the cloud vendor are pooled together and available for cloud leased out to contracted organisations by specialised SaaS
users to share and use. It differs from the public cloud in that vendors. This is traditionally accessed remotely using a web
all the cloud resources and applications are managed by the browser via the Internet. The software has limited
organisation itself, similar to Intranet functionality. Utilisation
functionality and its core pack can be expanded and contracted
on the private cloud can be much more secure than that of the
public cloud because of its specified internal exposure. Only allowing of easy customisation which is billed accordingly.
the organisation and designated stakeholders may have access SaaS providers may host the software in their own data centers
to operate on a specific Private cloud [5]. or with co-location providers, or may themselves be
outsourced to IaaS providers. The availability of IaaS services section of the paper will introduce current concerns faced in the
Cloud computing domain.
is a key enabler of the SaaS model [10]. Software as a service
applications are accessed using web browsers over the Internet IV. CLOUD COMPUTING CONCERNS
therefore web browser security is vitally important.
Upon strategically deciding on the appropriate cloud
Information security officers will need to consider various
delivery and deployment models to explore, security officers
methods of securing SaaS applications. Web Services (WS)
should be aware of the current Cloud computing concerns
security, Extendable Markup Language (XML) encryption, experienced in the Cloud environment. Gartner has conducted
Secure Socket Layer (SSL) and available options which are an investigation regarding the information security issues that
used in enforcing data protection transmitted over the Internet. should be considered when dealing with Cloud computing.
C. Platform as a Service (PaaS) The following list contains several security issues
Platform as a service cloud layer works like IaaS but it highlighted by Gartner that organisations and key decision
provides an additional level of “rented” functionality. Clients makers, as a prerequisite, should unpack with Cloud computing
using PaaS services transfer even more costs from capital vendors [9]:
investment to operational expenses but must acknowledge the
additional constraints and possibly some degree of lock-in • Privileged access: Who has specialised/privileged access
posed by the additional functionality layers [6]. The use of to data? Who decides about the hiring and management of
virtual machines act as a catalyst in the PaaS layer in Cloud such administrators?
computing. Virtual machines must be protected against • Regulatory compliance: Is the cloud vendor willing to
malicious attacks such as cloud malware. Therefore undergo external audits and/or security certifications?
maintaining the integrity of applications and well enforcing • Data location: Does the cloud vendor allow for any
accurate authentication checks during the transfer of data control over the location of data?
across the entire networking channels is fundamental. • Data segregation: Is encryption available at all stages, and
were these encryption schemes designed and tested by
Combining the three types of clouds with the delivery
experienced professionals?
models we get a holistic cloud illustration as seen in Figure 1,
surrounded by connectivity devices coupled with information • Recovery: What happens to data in the case of a disaster,
security themes. Virtualized physical resources, virtualized and does the vendor offer complete restoration, and, if so,
infrastructure, as well as virtualized middleware platforms and how long does that process take?
business applications are being provided and consumed as • Investigative Support: Does the vendor have the ability to
services in the Cloud [11]. Cloud vendors and clients’ need to investigate any inappropriate or illegal activity?
maintain Cloud computing security at all interfaces. The next
• Long-term viability: What happens to data if the cloud information security protocols to be enforced at various
vendor goes out of business, is clients’ data returned and different layers of cloud applications.
in what format?
D. Integrity
• Data availability: Can the cloud vendor move all their
clients’ data onto a different environment should the The integrity requirement lies in applying the due
existing environment become compromised or diligence within the cloud domain mainly when accessing
unavailable? data. Therefore ACID (atomicity, consistency, isolation and
durability) properties of the cloud’s data should without a
By considering the above mentioned cloud issues, doubt be robustly imposed across all Cloud computing deliver
executives can gain a comprehensive understanding as well as models
measure the feasibility of employing Cloud computing
E. Non-repudiation
solutions to best match their Cloud strategy. The next section
follows on from the concerns mentioned above and is aimed at Non-repudiation in Cloud computing can be obtained by
assisting IT managers assess business critical needs in terms of applying the traditional e-commerce security protocols and
information security requirements. token provisioning to data transmission within cloud
applications such as digital signatures, timestamps and
V. INFORMATION SECURITY REQUIREMENTS confirmation receipts services (digital receipting of messages
In the ISO 7498-2 standard [10], produced by The confirming data sent/received).
International Standards Organisation (ISO), Information F. Availability
Security should cover a number of suggested themes. Cloud
computing security should also be guided in this regard in Availability is one of the most critical information security
order to become an effective and secure technology solution. requirements in Cloud computing because it is a key decision
Figure 2, illustrating the information security requirements factor when deciding among private, public or hybrid cloud
coupled with the Cloud computing deployment model and vendors as well as in the delivery models. The service level
delivery models has been adapted from Eloff et al [12]. In agreement is the most important document which highlights
Figure 2, the different cloud delivery models and deployment the trepidation of availability in cloud services and resources
models are matched up against the information security between the cloud provider and client.
requirements with an “X” denoting mandatory requirements
and an asterisk (*) denoting optional requirements. However Therefore by exploring the information security
future work is needed in investigating the optimal balance requirements at each of the various cloud deployment and
required in securing Cloud computing. Figure 2 should be delivery models set out by the ISO, vendors and organisations
viewed in context as a guideline in assessing the security level. can become confident in promoting a highly protected safe
Each of the security requirements will be highlighted below in and sound cloud framework.
context of Cloud computing. VI. CLOUD SHORTFALLS
A. Identification & authentication From the survey done by the International Data Corporation
In Cloud computing, depending on the type of cloud as (IDC), we can learn enormous lessons from past and present
well as the delivery model, specified users must firstly be cloud players. The reference to the International Data
established and supplementary access priorities and Corporation, is important because it highlights the shortfalls of
permissions may be granted accordingly. This process is Cloud computing as well as users’ security expectations in
targeting at verifying and validating individual cloud users by Cloud computing. In the Cloud Computing Services Survey
employing usernames and passwords protections to their cloud conducted during August 08/09 by IDC IT group
(www.idc.com) [3], users were asked to rate their issues and
profiles.
challenges experienced with Cloud computing. The results
B. Authorisation shown in Figure 3 illustrate that security is the biggest concern.
Authorisation is an important information security Information security, availability and performance issues still
remain in the top 3 for both years the survey was done.
requirement in Cloud computing to ensure referential integrity
Security is the main issue users are concerned with when
is maintained. It follows on in exerting control and privileges
considering Cloud computing solutions.
over process flows within Cloud computing. Authorisation is
maintained by the system administrator in a Private cloud. Selecting and implementing the suitable cloud security
architecture is not as simple as it might seem as shown from
C. Confidentiality the survey above. Some of the most important issues for
In Cloud computing, confidentiality plays a major part companies to consider before engaging in Cloud computing,
especially in maintaining control over organisations’ data highlighted from the survey above, are the providers' terms of
situated across multiple distributed databases. It is a must service, as well as the location and data restrictions on
when employing a Public cloud due to public clouds information stored in the cloud. Down-time of cloud services is
accessibility nature. Asserting confidentiality of users’ profiles another growing concern. Cloud providers have the right to
and protecting their data, that is virtually accessed, allows for read and make public information that is put in the cloud.
There needs to be a subtle balance between cost effectiveness
and a smooth running of secure operations with the selected  How the organisation will deal with new and current
cloud environment. From the cloud shortfalls presented above Cloud compliance risks. This will deal with the
and by exploring the information security concerns, potential impact which Cloud computing may have
prospective users will become more familiar and aware of its on the business concerning governance and
potential and how Cloud computing can be used to better legislation.
improve the way we do things whilst pushing the boundaries of  How Cloud computing may affect the organisation
traditional norms adapted by society.
in terms of its business intelligence and intellectual
The biggest challenge in implementing successful Cloud property by potentially influencing its market
computing technologies is managing the security. As with any differentiation.
new technology enhancements, criticisms are driven by fear of
unknown variables and changes to current control procedures. In setting up a Cloud framework that specifically
How can cloud stakeholders ensure and promote the security addresses, organisations’ information security, senior
of Cloud computing? By focusing more on information professionals and management may look to adapt and
security awareness, cloud privacy and by ensuring appropriate incorporate current data protection, trust and privacy policies
policies and procedures are initially put in place, Cloud in formulating a comprehensive set of Cloud computing
computing can become the most viable information guidelines. These guidelines may include:
technology solution. Cloud security polices, cloud  Establishing an overall business Cloud computing
transparency and its security impact are the core themes in policy that highlights the organisations stance on
analysing the strategic information security of Cloud information protection.
computing which will covered in the next section. These  Govern the installation and communication of Cloud
themes, once fully understood and explored by potential end- computing when IT decisions are made.
users can provide the strategic intelligence in guiding the  Leverage of current IT audit and TAX processes with
successful implementation of a secure cloud solution. the in embedding cloud security disclosure and Cloud
audit practices.
VII. MANAGING CLOUD COMPUTING SECURITY
In order to effectively manage and control the use of cloud Cloud computing guidelines should be seen as the
technology in an organisation, business and strategic decision cornerstone of the Cloud strategy with Cloud governance and
makers need to begin with assessing the potential impact of transparency forming part of the security perspective.
Cloud computing on their competitive edge. Secondly,
business critical security questions of implementing cloud A. Cloud Govenance
technologies will then need to be evaluated. Managing and Cloud computing policies and procedures should be put in
controlling Cloud issues will need to address but not limited to place in an effort to protect the cloud from potential of threats,
the following: hacks and the loss of information. We must understand that it
is necessary to design privacy within the Cloud right from the
outset. The privacy challenge for software engineers is to connection takes significantly more processing power and
design cloud services in such a way so as to decrease privacy memory for a Web server to provide than a normal web
risks and to ensure legal compliance. There are threats connection [15]. WS-Security assists with SOAP messages by
associated with the data being stored, processed remotely and defining the header that carries the WS-Security extensions.
an increased usage of virtualisation and sharing of platforms Additionally, it defines how existing XML security standards
between users. Concerns arise when it is not clear to like XML Signature and XML Encryption are applied to
individuals why their personal information is requested or how SOAP messages [16]. Thus far there has been four service
it will be used or passed on to other parties. This lack of control failures identified between Amazon and Google in 2008,
leads to suspicion and ultimately distrust. The protection of ranging from 1.5 to 8 hours downtime. Organisations must
data in the cloud is a key consumer concern particularly for
decide whether proper security measures are in place (to
committing fraudulent activities and financial exploitation.
With governance and security in place, Cloud computing can secure their data and applications) or do they share a joint
be used safely and with confidence. responsibility with service providers when engaging in the
cloud environment [17].
B. Cloud Transparency
Transparent security would entail cloud providers The shift to Cloud computing moved much of a user’s
disclosing adequate information about their security policies, normal activity to the Web browser. Web browsers generally
design, and practices, including disclosing relevant security store all of a user’s saved passwords, browsing history and
measures in daily operations [9]. Public clouds are more likely other sensitive information in a single place. As such it is
to be seen as having a greater degree of transparency as possible for malicious websites to exploit browser
compared to the Hybrid or Private Cloud models. This is due to vulnerabilities in order to steal information associated with
public cloud vendors having a “standardised” cloud offering other existing or previous browsing sessions, such as a logged
thereby targeting a wider client base. Private clouds are usually in email account or online banking session. It is for this reason
built for specific organisations having more attention focused that some security experts recommend that consumers use one
on offering customization and personalisation cloud web browser for general surfing, and another for more
functionality. sensitive tasks, such as online banking. Often, usernames and
One of the most important protocols in ensuring passwords are transmitted to remote servers via unencrypted
transparency within Cloud computing is the SLA. The SLA is network connections. In cases where encryption is used, it is
the only legal agreement between the service provider and typically only used to transmit the initial login information,
client and its importance is greatly discussed in the article titled while all other subsequent data is sent in the clear. This data
“Cloud Security Issues” [13]. The only means that the cloud can easily be snooped on by hackers. This exposes users to
provider can gain the trust of clients is through the SLA, significant risks when they connect to the services using
therefore the SLA has to be standardised. The main aspects as public wireless networks to any Cloud Service.
a guideline, which the SLA contains, are:
 Services to be delivered, performance, In the book titled ‘The Tower and the Cloud’, Richard Katz
focuses on many areas where the cloud may impinge on
 Tracking and Reporting education [18]. He advocates that because companies might be
storing documents which should not be made public, there are
 Problem Management
reasons for concern about what can happen to the information.
 Legal Compliance Potential Cloud organisations and vendors need to be aware
that it may become easier for attackers to threaten clouds by
 Resolution of Disputes Customer Duties moving towards a single cloud interface.
 Security responsibility VIII. CONCLUSION
 Confidential Information Termination. Although Cloud computing can be seen as a new
One of the main challenges of Cloud computing is that the phenomenon which is set to revolutionise the way we use the
software vendor should assume responsibility for maintaining Internet, there is much to be cautious about. There are many
the application and ensuring quality of service [14]. new technologies emerging at a rapid rate, each with
technological advancements and with the potential of making
C. Cloud Computing’s Security Impact human’s lives easier. However one must be very careful to
As computer manufacturers, employers and universities understand the limitations and security risks posed in utilizing
deploy cloud based tools on desktops, many users may fail to these technologies. Cloud computing is no exception.
realize that they are in fact using an Internet based service. In this paper key security considerations and challenges
This risk of confusion will likely increase when cloud based which are currently faced in the Cloud computing industry are
applications lack any recognizable browser branding, and highlighted. While current offerings explore trail-and error
continue to function when the user is not connected to the control methods, a great deal of investment must be made in
Internet. The use of HTTPS together with WS Security should the managing security around this evolving technology. The
be a bare minimum when logging on to access data using Cloud Security Alliance [19] is one such organisation. It is a
Cloud computing. But providing a HTTPS encrypted non-profit organization formed to promote the use of best
practices for providing security assurance within Cloud Ec3JjcHZpZANPUHZlVzJLSWNycVFrRjFySGpwMDRDVzZXODV4
computing, and provide education on the uses of Cloud Wmt2bHMxTUFESnRt%2FSIG%3D13g7vo71f%2F**http%253A%2F
%2Fwww.mytestbox.com%2Fmiscellaneous%2Fcloud-computing-grid-
computing to help secure all other forms of computing. By computing-utility-computing-list-top-
following guiding principles discussed in this paper, a great providers%2F&section=biography&wrt_id=110, viewed 22 Feb 2010.
deal of insecurities may be easily expelled, saving business [9] Brodkin J, 2008, ‘Gartner: Seven cloud-computing security risks’,
owners’ valuable time and investment. Cloud computing has Infoworld, viewed 13 March 2009, from
the potential to become a frontrunner in promoting a secure, <http://www.infoworld.com/d/security-central/gartner-seven-cloud-
virtual and economically viable IT solution and future work computing-security-risks-853?page=0,1>
and progress lies in standardising Cloud computing security [10] ISO. ISO 7498-2:1989. Information processing systems- Open Systems
Interconnection. ISO 7498-2
protocols.
[11] Klems, M, Lenk, A, Nimis, J, Sandholm T and Tai S 2009, ‘What’s
REFERENCES Inside the Cloud? An Architectural Map of the Cloud Landscape’, IEEE
Xplore, pp 23-31, viewed 21 June 2009.
[12] Dlamini M T, Eloff M M and Eloff J H P, ‘Internet of People, Things
[1] Leavitt N, 2009, ‘Is Cloud Computing Really Ready for Prime Time?’, and Services – The Convergence of Security, Trust and Privacy’, 2009.
Computer, Vol. 42, pp. 15-20, 2009. [13] Balachandra R K, Ramakrishna P V, Dr. Rakshit A, ‘Cloud Security
[2] Weinhardt C, Anandasivam A, Blau B, and Stosser J, ‘Business Models Issues’, 2009 IEEE International Conference on Services Computing,
in the Service World’, IT Professional, vol. 11, pp. 28-33, 2009. viewed 26 October 2009, pp 517-520.
[3] Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and [14] S. Arnold, 2009,’ Cloud computing and the issue of privacy’, KM
Challenges’,IDC eXchange, viewed 18 February 2010, from World, vol July/August 2008, www.kmworld.com, viewed 19 August
<http://blogs.idc.com/ie/?p=730>. 2009, pp 14-22.
[4] A Platform Computing Whitepaper, ‘Enterprise Cloud [15] Soghoian C, 2009 ’Caught in the Cloud: Privacy, Encryption, and
Computing:Transforming IT’, Platform Computing, pp6, viewed 13 Government Back Doors in the Web 2.0 Era’, The Berkman Center for
March 2010. Internet & Society Research Publication Series:
[5] Dooley B, 2010, ‘Architectural Requirements Of The Hybrid Cloud’, http://cyber.law.harvard.edu/publications, viewed 22 August 2009.
Information Management Online, viewed 10 February 2010, from [16] Gruschka N, Iancono LL, Jensen M and Schwenk J, ‘On Technical
<http://www.information-management.com/news/hybrid-cloud- Security Issues in Cloud Computing’, ‘09 IEEE International
architectural-requirements-10017152-1.html>. Conference on Cloud Computing, pp 110-112, 2009.
[6] Global Netoptex Incorporated , 2009, Demystifying the cloud. Important [17] Armbrust M, Fox A, Griffith R, Joseph D A, Katz H R, Konwinski A,
opportunities, crucial choices, http://www.gni.com, pp 4-14, viewed 13 Lee Gunho, Patterson A D, Rabkin A, Stoica A, Zaharia M, (2009),
December 2009. Above the clouds: A Berkeley view of Cloud Computing, UC Berkeley
[7] Lofstrand M, ‘The VeriScale Architecture: Elasticity and Efficiency for EECS, Feb 2010
Private Clouds”, Sun Microsystems, Sun BluePrint, Online, Part No 821- [18] Goldstein, P (2009), The Tower, the Cloud, and the IT leader and
0248-11, Revision 1.1, 09/22/09 workforce, in Katz, R (ed) (2009), The Tower and the Cloud: Higher
[8] Goia M, ‘Cloud computing, grid computing, utility computing – list of Education in the Age of Cloud Computing, Educause
top providers’, http://www.educause.edu/thetowerandthecloud
http://www.123people.com/ext/frm?ti=personensuche%20telefonbuch& [19] Cloud Security Alliance Web site,
search_term=infosolve%20technologies&search_country=US&st=suche http://www.cloudsecurityalliance.org/, viewed 19 March 2010
%20nach%20personen&target_url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Flrd.yahooapis.com
%2F_ylc%3DX3oDMTVnc2pvM2dpBF9TAzIwMjMxNTI3MDIEYXB
waWQDc1k3Wlo2clYzNEhSZm5ZdGVmcmkzRUx4VG5makpERG5Q
OWVKV1NGSkJHcTJ1V1dFa0xVdm5IYnNBeUNyVkd5Y2REVElUX
2tlBGNsaWVudANib3NzBHNlcnZpY2UDQk9TUwRzbGsDdGl0bGU

View publication stats

You might also like