DocumentCode :
1455442
Title :
Hide and Seek in the Cloud
Author :
BluMenthal, Marjory S.
Author_Institution :
Georgetown University
Volume :
8
Issue :
2
fYear :
2010
Firstpage :
57
Lastpage :
58
Abstract :
Google´s January 2010 news of apparent attacks from China on its Gmail service is one of many hints that we should think harder about cloud computing´s merits. Touted by its advocates as the answer for many needs, the cloud triggered security concerns early. However, these concerns have been overwhelmed by the assurances offered with the hype. So let´s pause to consider the alter ego of the cloud as panacea: the cloud as a platform for malice. How bad could it get?
Keywords :
Internet; Web sites; electronic mail; security of data; Gmail service; Google; cloud computing; data security; Cloud computing; Security; cloud computing; cybercrime; security and privacy; virtual machines;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2010.70
Filename :
5439529
Link To Document :
بازگشت