Monitoring Cloud Computing by Layer, Part 2

  • Authors:
  • Jonathan Spring

  • Affiliations:
  • Software Engineering Institute

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2011

Quantified Score

Hi-index 0.01

Visualization

Abstract

This article presents a set of recommended restrictions and audits to facilitate cloud security. Monitoring cloud computing is complex; although outsourcing the decision might appear to simplify the problem, it might raise as many questions as it answers. By analyzing what the cloud provider and the customer are each responsible for at each cloud layer, it becomes easier to manage auditing and security monitoring.