2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications 2011
DOI: 10.1109/trustcom.2011.128
|View full text |Cite
|
Sign up to set email alerts
|

User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…There are challenges to cloud computing solutions such as lack of interoperability, compatibility with existing programs, difficulty in meeting regulations, and insufficient security. Lack of standardization and proprietary applications can lead to complexity and high costs, as well as security concerns with shared infrastructure not providing enough security [10].…”
Section: Cloud Computing Security Issues and Challengesmentioning
confidence: 99%
“…There are challenges to cloud computing solutions such as lack of interoperability, compatibility with existing programs, difficulty in meeting regulations, and insufficient security. Lack of standardization and proprietary applications can lead to complexity and high costs, as well as security concerns with shared infrastructure not providing enough security [10].…”
Section: Cloud Computing Security Issues and Challengesmentioning
confidence: 99%
“…Eucalyptus has built on various technologies mainly C, Java, JavaScript, Groovy and Python [2]. Issues to be underlined are technology amalgamation [3] deals with a mixture of two or more technologies in one environment, xml security issues, for example, in Eucalyptus under the CLC source code tree there is file xml-securityconfig.xml. There is a tag for TransformAlgorithms, if remain uncommented, could facilitate the DoS (Denial of Service) attack on Cloud system; inherent security issues [4] [25] etc.…”
Section: Fig 1 Cloud Forensics Statisticsmentioning
confidence: 99%
“…The term "on-site virtualized environment" means the CSP permits partaken of either same or multiple resources to user groups. While investigating for compromised user data, this policy introduces risk of exposure of other users' data to the analyst due to shared nature [3] [13] [26]. The more fruitful analysis is found to be Live analysis but on the other side most agile in nature.…”
Section: Related Workmentioning
confidence: 99%
“…Cloud security in general has been explored various times in the literature and various inside and outside attacks have been discussed along with some proposed solutions [20,21,22,23] but infonnation leakage attacks have not received much attention. Even though information leakage attacks made possible through the presence of shared physical resources have been explored in non-cloud environments [17,18,19].…”
Section: Related Workmentioning
confidence: 99%