An investigation into cloud configuration and security | IEEE Conference Publication | IEEE Xplore