The top ten cloud-security practices in next-generation networking

  • Authors:
  • Wolf Michael Halton;Syed Rahman

  • Affiliations:
  • Atlanta Clout Technology, Inc., 302 N Colonial Homes Cir. NW, Atlanta, GA 30309, USA.;Department of Computer Science and Engineering, University of Hawaii-Hilo, 200 W. Kawili Street, Hilo, HI 96720, USA

  • Venue:
  • International Journal of Communication Networks and Distributed Systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Next-generation networking is moving out of the LAN and adopting cloud computing increasingly. Virtual machines and clouds mask the hardware infrastructure from the LAN administrator as well. Cloud architecture will be ubiquitous and in the future clouds will drop the unnecessary distinction of platform as a service, leaving a slightly larger infrastructure as a service (IaaS) level and an application level (SaaS). Provisioning costs will get lower but the costs of data breaches will continue to climb. This paper explores the security ramifications of cloud-adoption by reviewing the literature and presenting a collection of best-practices for security in the cloud.