This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Security Challenges for the Public Cloud
January/February 2012 (vol. 16 no. 1)
pp. 69-73
Kui Ren, Illinois Institute of Technology
Cong Wang, Illinois Institute of Technology
Qian Wang, Illinois Institute of Technology

Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and motivate further investigation of security solutions for a trustworthy public cloud environment.

1. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," US Nat'l Inst. of Science and Technology, 2011; http://csrc.nist.gov/publications/nistpubs/ 800-145SP800-145.pdf.
2. "Security Guidance for Critical Areas of Focus in Cloud Computing," Cloud Security Alliance, Dec. 2009; https://cloudsecurityalliance.orgcsaguide.pdf .
3. T. Ristenpart et al., "Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM Press, 2009, pp. 199–212.
4. C. Wang et al., "Privacy-Preserving Public Auditing for Storage Security in Cloud Computing," Proc. 30th IEEE Int'l Conf. Computer Communications (INFOCOM 10), IEEE Press, 2010, pp. 525–533.
5. S. Halevi et al., "Proofs of Ownerhip in Remote Storage Systems," Proc. 18th ACM Conf. Computer and Communications Security (CCS 11), ACM Press, 2011, pp. 491–500.
6. K. Bowers et al., "How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes," Proc. 18th ACM Conf. Computer and Communications Security (CCS 11), ACM Press, 2011, pp. 501–514.
7. C. Wang, K. Ren, and J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing," Proc. 31st IEEE Int'l Conf. Computer Communications (INFOCOM 11), IEEE Press, 2011, pp. 820–828.
8. R. Wang et al., "Privacy-Preserving Genomic Computation through Program Specialization," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM Press, 2009, pp. 338–347.
9. S. Yu et al., "Achieving Secure, Scalable, and Fine-Grained Access Control in Cloud Computing," Proc. 30th IEEE Int'l Conf. Computer Communications (INFOCOM 10), IEEE Press, 2010, pp. 534–542.
10. M. Liu and X. Ding, "On Trustworthiness of CPU Usage Metering and Accounting," Proc. 1st Int'l Workshop Security and Privacy in Cloud Computing (ICDCS-SPCC 10), IEEE Press, 2010, pp. 82–91.

Index Terms:
cloud computing, security, privacy, trust
Citation:
Kui Ren, Cong Wang, Qian Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, Jan.-Feb. 2012, doi:10.1109/MIC.2012.14
Usage of this product signifies your acceptance of the Terms of Use.