Fundamentals of Cloud Security

Cloud Computing is an emerging paradigm that aims at delivering computing, information services, and data storage as a utility service over a network (e.g., Internet). There is a strong interest in cloud computing due to their performance and host, but their rapid deployment will exacerbate the security problem. In cloud computing, organizations relinquish direct control of many security aspects to the service providers such as trust, privacy preservation, identity management, data and software isolation, and service availability.

Cloud Computing and Security

Cloud computing is a concept used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.[1] In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time.

Cloud Computing Types

Cloud computing, whether supporting a Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) or Infrastructure-as-a-Service (IaaS), or other variant, incorporates numerous hardware, software, middleware, security, monitoring and other capabilities to ensure application and information processing performance and reliability.

Cloud Computing Security: From Single to Multi-Clouds

The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud.

Cyber Attacks

The cyber space is a growing community where everyone can reach out to one another regardless of time and distance. It has become a new way of life, but has its negative repercussions as well. Some individuals use the cyberspace for their own dubious schemes, as they target unsuspecting individuals, companies, banks and even the military and government agencies. Here are the 25 biggest cyber attacks in history that were launched as large-scale cyber terrorism and affected whole sovereign nations.

Insider threats to Cloud Computing

The paper discusses Insider threats to Cloud computing and directions for new research challenges. It will present the different types of cloud related Insider threats. It will also discuss on why these attacks will succeed with the current nature of architecture of the cloud systems.

Technical Issues in Cloud Security

The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user’s data has to be released to the Cloud and thus leaves the protection sphere of the data owner.

Security Concerns in Enterprise Cloud Computing

Deploying cloud computing in an enterprise infrastructure bring significant security concerns.Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. This post discusses security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources.

Google Faculty Summit Cloud Computing and Software Security

This video is about the Cloud Computing and Software Security at 2010 Google Faculty Summit
Speaker: Dr. Úlfar Erlingsson, security researcher at Google