Fighting computer crime: a new framework for protecting information
Fighting computer crime: a new framework for protecting information
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
SubVirt: Implementing malware with virtual machines
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Virtual Machine Introspection: Observation or Interference?
IEEE Security and Privacy
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Data Security in the World of Cloud Computing
IEEE Security and Privacy
On Technical Security Issues in Cloud Computing
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
SCC '09 Proceedings of the 2009 IEEE International Conference on Services Computing
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Controlling data in the cloud: outsourcing computation without outsourcing control
Proceedings of the 2009 ACM workshop on Cloud computing security
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Can a Trusted Environment Provide Security?
IEEE Security and Privacy
Virtualization: a key feature of cloud computing
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
TrustStore: Making Amazon S3 Trustworthy with Services Composition
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Attack Surfaces: A Taxonomy for Attacks on Cloud Services
CLOUD '10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
Cloud Computing System Based on Trusted Computing Platform
ICICTA '10 Proceedings of the 2010 International Conference on Intelligent Computation Technology and Automation - Volume 01
Can Public-Cloud Security Meet Its Unique Challenges?
IEEE Security and Privacy
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Venus: verification for untrusted cloud storage
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Seeding clouds with trust anchors
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
A new form of DOS attack in a cloud and its avoidance mechanism
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
ICPPW '10 Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
Don't Trust. And Verify: A Security Architecture Stack for the Cloud
IEEE Security and Privacy
Permission Management System: Permission as a Service in Cloud Computing
COMPSACW '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
IEEE Transactions on Parallel and Distributed Systems
SP 800-145. The NIST Definition of Cloud Computing
SP 800-145. The NIST Definition of Cloud Computing
Hi-index | 0.00 |
Cloud computing is in its infancy and continues to evolve. As this evolution proceeds, there are a number of privacy and security concerns emerging from the cloud computing model that need to be addressed before broad acceptance occurs. This paper is an initial literature survey of cloud computing security, which promises to be a challenging research area. Although cloud computing security research inherits previous research from its elemental technologies, this paper will limit its focus on surveying cloud computing targeted research. By performing a systematic analysis of the security aspects of the cloud model, this work seeks to succinctly clarify why security continues to be a significant impediment for cloud adoption.