• DocumentCode
    1817078
  • Title

    Cloud Security Issues

  • Author

    Kandukuri, Balachandra Reddy ; Paturi, V.R. ; Rakshit, Atanu

  • Author_Institution
    Adv. Software Technol., Int. Inst. of Inf. Technol., Pune, India
  • fYear
    2009
  • fDate
    21-25 Sept. 2009
  • Firstpage
    517
  • Lastpage
    520
  • Abstract
    In past three decades, the world of computation has changed from centralized (client-server not web-based) to distributed systems and now we are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has full control on data and processes in his/her computer. On the other hand, we have the cloud computing wherein, the service and data maintenance is provided by some vendor which leaves the client/customer unaware of where the processes are running or where the data is stored. So, logically speaking, the client has no control over it. The cloud computing uses the internet as the communication media. When we look at the security of data in the cloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince the customer on security issues. Organizations use cloud computing as a service infrastructure, critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues. So the SLA has to describe different levels of security and their complexity based on the services to make the customer understand the security policies that are being implemented. There has to be a standardized way to prepare the SLA irrespective to the providers. This can help some of the enterprises to look forward in using the cloud services. In this paper, we put forward some security issues that have to be included in SLA.
  • Keywords
    Internet; contracts; security of data; Internet; business critical insensitive applications; cloud computing; cloud security issues; communication media; distributed systems; infrastructure as a service; platform as a service; security policies; service infrastructure; service level agreements; software as a service; virtual centralization; Application software; Automation; Cloud computing; Computer architecture; Conference management; Costs; Data security; Marketing and sales; Subscriptions; Usability; Cloud Computing; Cloud computing Security; Service Level Agreement (SLA); Software as a Service (SaaS);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Services Computing, 2009. SCC '09. IEEE International Conference on
  • Conference_Location
    Bangalore
  • Print_ISBN
    978-1-4244-5183-8
  • Electronic_ISBN
    978-0-7695-3811-2
  • Type

    conf

  • DOI
    10.1109/SCC.2009.84
  • Filename
    5283911