Abstract:
Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This article explores the roadblocks ...Show MoreMetadata
Abstract:
Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment.
Published in: IEEE Security & Privacy ( Volume: 8, Issue: 6, Nov.-Dec. 2010)
DOI: 10.1109/MSP.2010.186
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cloud Computing ,
- Security Challenges ,
- Privacy Challenges ,
- Cloud Computing Environment ,
- Agility ,
- Security Solutions ,
- Service Providers ,
- Data Protection ,
- Data Privacy ,
- Identity Information ,
- Management Services ,
- Interoperability ,
- Access Control ,
- Delivery Models ,
- Global Policy ,
- Virtual Machines ,
- Protection Requirements ,
- Deployment Model ,
- Cloud Environment ,
- Identity Management ,
- Private Cloud ,
- Cloud Providers ,
- Public Cloud ,
- Security Approach ,
- Digital Identity ,
- Accessibility Requirements ,
- Delegation ,
- Service Level Agreement ,
- Establishment Of Trust ,
- Security Requirements
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cloud Computing ,
- Security Challenges ,
- Privacy Challenges ,
- Cloud Computing Environment ,
- Agility ,
- Security Solutions ,
- Service Providers ,
- Data Protection ,
- Data Privacy ,
- Identity Information ,
- Management Services ,
- Interoperability ,
- Access Control ,
- Delivery Models ,
- Global Policy ,
- Virtual Machines ,
- Protection Requirements ,
- Deployment Model ,
- Cloud Environment ,
- Identity Management ,
- Private Cloud ,
- Cloud Providers ,
- Public Cloud ,
- Security Approach ,
- Digital Identity ,
- Accessibility Requirements ,
- Delegation ,
- Service Level Agreement ,
- Establishment Of Trust ,
- Security Requirements
- Author Keywords