The Eucalyptus Open-Source Cloud-Computing System
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Data Security in the World of Cloud Computing
IEEE Security and Privacy
Comparison of Several Cloud Computing Platforms
ISISE '09 Proceedings of the 2009 Second International Symposium on Information Science and Engineering
Can Public-Cloud Security Meet Its Unique Challenges?
IEEE Security and Privacy
Mutual Protection in a Cloud Computing Environment
HPCC '10 Proceedings of the 2010 IEEE 12th International Conference on High Performance Computing and Communications
Open Source Cloud Computing Platforms
GCC '10 Proceedings of the 2010 Ninth International Conference on Grid and Cloud Computing
A Comparison and Critique of Eucalyptus, OpenNebula and Nimbus
CLOUDCOM '10 Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science
Building a Security Aware Cloud by Extending Internal Control to Cloud
ISADS '11 Proceedings of the 2011 Tenth International Symposium on Autonomous Decentralized Systems
Understanding Cloud Computing Vulnerabilities
IEEE Security and Privacy
Collaboration-Based Cloud Computing Security Management Framework
CLOUD '11 Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing
VM Leakage and Orphan Control in Open-Source Clouds
CLOUDCOM '11 Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science
Live deduplication storage of virtual machine images in an open-source cloud
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
A security analysis of amazon's elastic compute cloud service
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Comparison of Multiple Cloud Frameworks
CLOUD '12 Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing
Microsoft and Amazon: A comparison of approaches to cloud security
CLOUDCOM '12 Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
Hi-index | 0.00 |
Cloud security becomes a hot topic in the emerging new cloud environments. Customers would like to understand what happens when they move their applications, data and information on the cloud. Probably one of the most interesting questions is what are the new challenges that cloud virtual environment produces due to multitenancy and virtualization. Security challenges addressed in this paper are vulnerabilities that may happen inside or outside the cloud environment. The security evaluation methodology uses Nessus scoring system for two target groups: physical and software parts using different scenarios. Our experiments are realized with four virtual machine instances instantiated in Eucalyptus cloud with different operating systems hosted. We also evaluate the security of the Eucalyptus cloud version.