Data protection models for service provisioning in the cloud
Proceedings of the 15th ACM symposium on Access control models and technologies
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
Semantic similarity model for risk assessment in forming cloud computing SLAs
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Intrusion detection system in cloud computing environment
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
Different facets of security in the cloud
Proceedings of the 15th Communications and Networking Simulation Symposium
Security analysis of public cloud computing
International Journal of Communication Networks and Distributed Systems
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
An efficient and secure data sharing framework using homomorphic encryption in the cloud
Proceedings of the 1st International Workshop on Cloud Intelligence
Provenance-Based model for verifying trust-properties
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Gaining the profits of cloud computing in a public authority environment
International Journal of Computational Science and Engineering
Much ado about security appeal: cloud provider collaborations and their risks
ESOCC'12 Proceedings of the First European conference on Service-Oriented and Cloud Computing
A survey on security issues and solutions at different layers of Cloud computing
The Journal of Supercomputing
A Framework for Analysing the Impact of Cloud Computing on Local Government in the UK
International Journal of Cloud Applications and Computing
Cloud Computing in Local Government: From the Perspective of Four London Borough Councils
International Journal of Cloud Applications and Computing
Privacy and anonymity in untrusted data stores
ADC '11 Proceedings of the Twenty-Second Australasian Database Conference - Volume 115
Toward designing a secure biosurveillance cloud
The Journal of Supercomputing
Proceedings of the 6th International Conference on Security of Information and Networks
Securing data services: a security architecture design for private storage cloud based on HDFS
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
In past three decades, the world of computation has changed from centralized (client-server not web-based) to distributed systems and now we are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has full control on data and processes in his/her computer. On the other hand, we have the cloud computing wherein, the service and data maintenance is provided by some vendor which leaves the client/customer unaware of where the processes are running or where the data is stored. So, logically speaking, the client has no control over it. The cloud computing uses the internet as the communication media. When we look at the security of data in the cloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince the customer on security issues. Organizations use cloud computing as a service infrastructure, critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues. So the SLA has to describe different levels of security and their complexity based on the services to make the customer understand the security policies that are being implemented. There has to be a standardized way to prepare the SLA irrespective to the providers. This can help some of the enterprises to look forward in using the cloud services. In this paper, we put forward some security issues that have to be included in SLA.