Title :
Cloud security: Can the cloud be secured?
Author :
Karnad, K. ; Nagenthram, Saravanan
Author_Institution :
Product Quality & Reliability Eng., MIMOS Berhad, Kuala Lumpur, Malaysia
Abstract :
Techniques used for attacking the legacy web applications are still valid on the cloud, but the legacy security methods are no longer valid. Welcome to the new world! Cloud computing is ubiquitous with ease of use, zero hardware issues, pay as you grow and other trendy terminologies. It is also perceived as being more secure on cloud. Does that mean there is no need for any penetration testing for cloud-based applications? If needed, what should be those set of tests, and which tools are best suited to perform these? How different is cloud security testing from the legacy three-tier architecture testing? It is a known fact that companies invest less when it comes to security. So what alternatives are we left with? These, among other questions are answered during the course of this white paper.
Keywords :
cloud computing; security of data; software maintenance; Cloud computing; Web applications; cloud based applications; cloud security; legacy security methods; Communication system security; Computational modeling; Encryption; Scalability; Wireless communication; XML; Backtrack; Metasploit; Pen Testing; mobile; open source tools for security testing; security on cloud; wireless;
Conference_Titel :
Internet Technology And Secured Transactions, 2012 International Conference for
Conference_Location :
London
Print_ISBN :
978-1-4673-5325-0