Towards incident handling in the cloud: challenges and approaches
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
A survey of risks, threats and vulnerabilities in cloud computing
Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications
Home is safer than the cloud!: privacy concerns for consumer cloud storage
Proceedings of the Seventh Symposium on Usable Privacy and Security
Future Generation Computer Systems
Cloud services evaluation framework
Proceedings of the Workshop on Open Source and Design of Communication
Classifying different denial-of-service attacks in cloud computing using rule-based learning
Security and Communication Networks
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
Abusing cloud-based browsers for fun and profit
Proceedings of the 28th Annual Computer Security Applications Conference
Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
International Journal of Cloud Applications and Computing
Journal of Computer and System Sciences
Security vulnerabilities from inside and outside the Eucalyptus cloud
Proceedings of the 6th Balkan Conference in Informatics
Proceedings of the 9th International Symposium on Open Collaboration
A framework to support selection of cloud providers based on security and privacy requirements
Journal of Systems and Software
IT security auditing: A performance evaluation decision model
Decision Support Systems
Privacy-preserving identity federations in the cloud: a proof of concept
International Journal of Security and Networks
Computer Standards & Interfaces
Hi-index | 0.00 |
The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact difficult for two primary reasons. First, as is true for many discussions about risk, basic vocabulary such as "risk," "threat," and "vulnerability" are often used as if they were interchangeable, without regard to their respective definitions. Second, not every issue that's raised is really specific to cloud computing. We can achieve an accurate understanding of the security issue "delta" that cloud computing really adds by analyzing how cloud computing influences each risk factor. One important factor concerns vulnerabilities: cloud computing makes certain well-understood vulnerabilities more significant and adds new vulnerabilities. Here, the authors define four indicators of cloud-specific vulnerabilities, introduce a security-specific cloud reference architecture, and provide examples of cloud-specific vulnerabilities for each architectural component.