The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2012 vol.16)
pp: 69-73
Kui Ren , Illinois Institute of Technology
Cong Wang , Illinois Institute of Technology
Qian Wang , Illinois Institute of Technology
ABSTRACT
<p>Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and motivate further investigation of security solutions for a trustworthy public cloud environment.</p>
INDEX TERMS
cloud computing, security, privacy, trust
CITATION
Kui Ren, Cong Wang, Qian Wang, "Security Challenges for the Public Cloud", IEEE Internet Computing, vol.16, no. 1, pp. 69-73, January/February 2012, doi:10.1109/MIC.2012.14
REFERENCES
1. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," US Nat'l Inst. of Science and Technology, 2011; http://csrc.nist.gov/publications/nistpubs/ 800-145SP800-145.pdf.
2. "Security Guidance for Critical Areas of Focus in Cloud Computing," Cloud Security Alliance, Dec. 2009; https://cloudsecurityalliance.orgcsaguide.pdf .
3. T. Ristenpart et al., "Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM Press, 2009, pp. 199–212.
4. C. Wang et al., "Privacy-Preserving Public Auditing for Storage Security in Cloud Computing," Proc. 30th IEEE Int'l Conf. Computer Communications (INFOCOM 10), IEEE Press, 2010, pp. 525–533.
5. S. Halevi et al., "Proofs of Ownerhip in Remote Storage Systems," Proc. 18th ACM Conf. Computer and Communications Security (CCS 11), ACM Press, 2011, pp. 491–500.
6. K. Bowers et al., "How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes," Proc. 18th ACM Conf. Computer and Communications Security (CCS 11), ACM Press, 2011, pp. 501–514.
7. C. Wang, K. Ren, and J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing," Proc. 31st IEEE Int'l Conf. Computer Communications (INFOCOM 11), IEEE Press, 2011, pp. 820–828.
8. R. Wang et al., "Privacy-Preserving Genomic Computation through Program Specialization," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM Press, 2009, pp. 338–347.
9. S. Yu et al., "Achieving Secure, Scalable, and Fine-Grained Access Control in Cloud Computing," Proc. 30th IEEE Int'l Conf. Computer Communications (INFOCOM 10), IEEE Press, 2010, pp. 534–542.
10. M. Liu and X. Ding, "On Trustworthiness of CPU Usage Metering and Accounting," Proc. 1st Int'l Workshop Security and Privacy in Cloud Computing (ICDCS-SPCC 10), IEEE Press, 2010, pp. 82–91.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool