2012
DOI: 10.1186/2192-113x-1-11
|View full text |Cite
|
Sign up to set email alerts
|

A quantitative analysis of current security concerns and solutions for cloud computing

Abstract: The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0
12

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 167 publications
(89 citation statements)
references
References 8 publications
0
77
0
12
Order By: Relevance
“…If the data is migrated to a location with different laws, it becomes difficult for the user to configure the policies to comply with the new legal jurisdictions [4]. Moreover the data can be located in more than one location having different security laws and in the case of a dispute the issue of jurisdiction arises as to which laws are applicable [32,30,29].E-discovery which happens when a CSP hardware is seized for an investigation claim by a user related to the laws of a geographical location causes in return a risk of privacy breach of other users [33,30].…”
Section: Slas and Legal Issues:-mentioning
confidence: 99%
See 1 more Smart Citation
“…If the data is migrated to a location with different laws, it becomes difficult for the user to configure the policies to comply with the new legal jurisdictions [4]. Moreover the data can be located in more than one location having different security laws and in the case of a dispute the issue of jurisdiction arises as to which laws are applicable [32,30,29].E-discovery which happens when a CSP hardware is seized for an investigation claim by a user related to the laws of a geographical location causes in return a risk of privacy breach of other users [33,30].…”
Section: Slas and Legal Issues:-mentioning
confidence: 99%
“…Moreover, statistics provided by the CSP on contract performance is unreliable which raises conflicts between the user and the CSP which in turn makes the statistics evaluation and determination of responsibility an issue [30].In addition the SLAs are pre-defined and non-negotiable which makes them CSP bias [29].Furthermore, auditing the security of the CSP is hard to carry out and agree upon in the SLA [4].…”
Section: Slas and Legal Issues:-mentioning
confidence: 99%
“…More specifically, cloud describes the use of a collection of distributed services, applications, information and infrastructure comprised of pools of compute, network, information and storage resources [4]. These components can be manipulated, provisioned, implemented and decommissioned using an on demand utility-like model of allocation and consumption.…”
Section: Techenical Background 21 the Architecture Of Cloud Computingmentioning
confidence: 99%
“…The trade-off between protection costs and attack costs will be a major output of this analysis. Another economic aspect is the minimization of the VM's downtime during the migration to prevent a monetary [48] and a reputational loss [16] for the cloud provider. The service provider commits to a certain level of service, which is described by a SLA.…”
Section: Decision Enginementioning
confidence: 99%