Security and Privacy Challenges in Cloud Computing Environments | IEEE Journals & Magazine | IEEE Xplore

Security and Privacy Challenges in Cloud Computing Environments


Abstract:

Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This article explores the roadblocks ...Show More

Abstract:

Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment.
Published in: IEEE Security & Privacy ( Volume: 8, Issue: 6, Nov.-Dec. 2010)
Page(s): 24 - 31
Date of Publication: 03 December 2010

ISSN Information:

University of Pittsburgh, USA
Hassan Takabi is a PhD student in the School of Information Sciences and a member of the Laboratory of Education and Research on Security Assured Information Systems (LERSAIS) at the University of Pittsburgh. His research interests include access control models; trust management; privacy and Web security; usable privacy and security; and security, privacy, and trust issues in cloud computing environments. Takabi has an MS...Show More
Hassan Takabi is a PhD student in the School of Information Sciences and a member of the Laboratory of Education and Research on Security Assured Information Systems (LERSAIS) at the University of Pittsburgh. His research interests include access control models; trust management; privacy and Web security; usable privacy and security; and security, privacy, and trust issues in cloud computing environments. Takabi has an MS...View more
University of Pittsburgh, USA
James B.D. Joshi is an associate professor and the director of the Laboratory for Education and Research on Security Assured Information Systems (LERSAIS) in the School of Information Sciences at the University of Pittsburgh. His research interests include role-based access control, trust management, and secure interoperability. Joshi has a PhD in computer engineering from Purdue University. He is a member of IEEE and the...Show More
James B.D. Joshi is an associate professor and the director of the Laboratory for Education and Research on Security Assured Information Systems (LERSAIS) in the School of Information Sciences at the University of Pittsburgh. His research interests include role-based access control, trust management, and secure interoperability. Joshi has a PhD in computer engineering from Purdue University. He is a member of IEEE and the...View more
Arizona State University, USA
Gait-loon Ahn is an associate professor and the director of the Security Engineering for Future Computing (SEFCOM) Laboratory in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. His research interests include information and systems security, vulnerability and risk management, access control, and security architecture for distributed systems. Ahn has a PhD in information ...Show More
Gait-loon Ahn is an associate professor and the director of the Security Engineering for Future Computing (SEFCOM) Laboratory in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. His research interests include information and systems security, vulnerability and risk management, access control, and security architecture for distributed systems. Ahn has a PhD in information ...View more

Computing: Definition and Features

Although several researchers have tried to define cloud computing, no single, agreed-upon definition exists yet. The US National Institute of Standards and Technology (NIST, http://csrc.nist.gov) defines it as follows:

Cloud computing is a model for enabling conve-nient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three delivery models, and four deployment models.

University of Pittsburgh, USA
Hassan Takabi is a PhD student in the School of Information Sciences and a member of the Laboratory of Education and Research on Security Assured Information Systems (LERSAIS) at the University of Pittsburgh. His research interests include access control models; trust management; privacy and Web security; usable privacy and security; and security, privacy, and trust issues in cloud computing environments. Takabi has an MS in information technology from Sharif University of Technology, Iran. He is student member of IEEE and the ACM. Contact him at hatakabi@sis.pitt.edu.
Hassan Takabi is a PhD student in the School of Information Sciences and a member of the Laboratory of Education and Research on Security Assured Information Systems (LERSAIS) at the University of Pittsburgh. His research interests include access control models; trust management; privacy and Web security; usable privacy and security; and security, privacy, and trust issues in cloud computing environments. Takabi has an MS in information technology from Sharif University of Technology, Iran. He is student member of IEEE and the ACM. Contact him at hatakabi@sis.pitt.edu.View more
University of Pittsburgh, USA
James B.D. Joshi is an associate professor and the director of the Laboratory for Education and Research on Security Assured Information Systems (LERSAIS) in the School of Information Sciences at the University of Pittsburgh. His research interests include role-based access control, trust management, and secure interoperability. Joshi has a PhD in computer engineering from Purdue University. He is a member of IEEE and the ACM. Contact him at jjoshi@sis.pitt.edu.
James B.D. Joshi is an associate professor and the director of the Laboratory for Education and Research on Security Assured Information Systems (LERSAIS) in the School of Information Sciences at the University of Pittsburgh. His research interests include role-based access control, trust management, and secure interoperability. Joshi has a PhD in computer engineering from Purdue University. He is a member of IEEE and the ACM. Contact him at jjoshi@sis.pitt.edu.View more
Arizona State University, USA
Gait-loon Ahn is an associate professor and the director of the Security Engineering for Future Computing (SEFCOM) Laboratory in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. His research interests include information and systems security, vulnerability and risk management, access control, and security architecture for distributed systems. Ahn has a PhD in information technology from George Mason University. He is a recipient of the US Department of Energy Career Award and the Educator of the Year Award from the Federal Information Systems Security Educators Association (FISSEA). Ahn is a senior member of IEEE and the ACM. Contact him at gahn@asu.edu.
Gait-loon Ahn is an associate professor and the director of the Security Engineering for Future Computing (SEFCOM) Laboratory in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. His research interests include information and systems security, vulnerability and risk management, access control, and security architecture for distributed systems. Ahn has a PhD in information technology from George Mason University. He is a recipient of the US Department of Energy Career Award and the Educator of the Year Award from the Federal Information Systems Security Educators Association (FISSEA). Ahn is a senior member of IEEE and the ACM. Contact him at gahn@asu.edu.View more

Contact IEEE to Subscribe

References

References is not available for this document.