This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Information Assurance Practices of Cloud Computing Vendors
July/August 2010 (vol. 12 no. 4)
pp. 29-37
Rajarshi Chakraborty, University at Buffalo,
Srilakshmi Ramireddy, University at Buffalo,
T.S. Raghu, Arizona State University,
H.Raghav Rao, SUNY at Buffalo University at Buffalo, Buffalo Buffalo

Cloud computing has fostered many concerns about security, privacy, and business integrity. How do information assurance practices differ based on a cloud vendor's service offering, amount of online traffic, and company size?

1. P. Mell and T. Grance, "Effectively and Securely Using the Cloud Computing Paradigm," Nat'l Inst. of Standards and Technology (NIST), 2009; http://www-08.nist.gov/groups/SNScloud-computing .
2. R.L. Grossman, "The Case for Cloud Computing," IT Professional, vol. 11, no. 2, 2009, pp. 23–27.
3. R. Westervelt, "Cloud Computing Security Group Releases Report Outlining Trouble Areas," SearchSecurity.com, 22 Apr. 2009; http://searchsecurity.techtarget.com/news/ article0,289142,sid14_gci1354553,00. html .
4. "F5 Study Shows Cloud Computing Gaining Critical Mass Among Large Enterprises," F5 Networks, Aug. 2009; www.f5.com/news-press-events/press/200920090824a.html .
5. L.M. Vaquero et al., "A Break in the Clouds: Towards a Cloud Definition," ACM Sigcomm Computer Comm. Rev., vol. 39, no. 1, 2009, pp. 50–55.
6. S. Bhardwaj, L. Jain, and S. Jain, "Cloud Computing: A Study of Infrastructure as a Service (IaaS)," Int'l J. Eng and Information Technology, vol. 2, no. 1, 2010, pp. 60–63.
7. K.S. Swaminathan, "Computing in the Clouds," Outlook J., May 2008; www.accenture.com/NR/rdonlyres/321DC1B6-9A79-4F0E-8C5A-E1807444D52B/ 0OutlookPDF_Edge_01.pdf .
8. T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 2009.
9. R. Buyya et al., "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility," Future Generation Computer Systems, vol. 25, no. 6, 2009, pp. 599–616.
10. E. Chabrow, "Rules Make Adoption of Cloud Computing Challenge for Agencies," Govinfosecurity.com, Apr. 2009; www.govinfosecurity.comarticles.php?art_id=1348 .
11. A.B. Howard, "FISMA Compliance for Federal Cloud Computing on the Horizon in 2010," SearchComplaince.com, 18 Dec. 2009; http://searchcompliance.techtarget.com/news/ article0,289142,sid195_gci1377298,00.html .
12. J.N. Hoover, "Microsoft Seeks New Legal Framework for Cloud," Information Week,22 Jan. 2010; www.networkcomputing.com/virtualizationmicrosoft-seeks-new-legal-framework-for-cloud.php .
13. C. Wang, "Forrester: A Close Look At Cloud Computing Security Issues," CSO,1 July 2009; www.csoonline.com/article/496388Forrester_A_Close_Look_At_Cloud_Computing_Security_Issues .
14. J. Staten et al., "Is Cloud Computing Ready For The Enterprise?" Forrester Research, Mar. 2008; www.forrester.com/rb/Research/is_cloud_computing_ready_for_enterprise/ q/id/44229/ t2.
15. D. Hakala, "The Top 10 New Cloud Computing Vendors," Focus Magazine,30 Apr. 2009; www.focus.com/articles/hosting-bandwidth top-10-new-cloud-computing-vendors.
16. L. McLaughlin, "11 Cloud Computing Vendors to Watch," CIO,11 Mar. 2008; www.cio.com/article/19500011_Cloud_Computing_Vendors_to_Watch .
17. D.J. Kim, N. Sivasailam, and H.R. Rao, "Information Assurance in B2C Websites," Electronic Markets, vol. 14, no. 4, 2004.
18. N. Sivasailam, D.J. Kim, and H.R. Rao, "What Companies Are(n't) Doing about Web Site Assurance," IT Professional, vol. 4, no. 3, 2002, pp. 33–40.
19. S.L. Jarvenpaa, N. Tractinsky, and M. Vitale, "Consumer Trust in an Internet Store," Information Technology and Management, vol. 1, nos 1–2, 2000, pp. 45–71.
20. R.C. Mayer, J.H. Davis, and F.D. Schoorman, "An Integrative Model of Organizational Trust," Academy of Management Rev., vol. 20, no. 3, 1995, pp. 709–734.
21. R. Chakraborty et al., "A Comparative Study of Cloud Computing Vendors and Their Information Assurance Practices," Proc. 3rd Int'l Conf. Virtual Computing Initiative (ICVCI 09), IBM Univ. Days, 2009.
22. P. Kumaraguru and L. Cranor, "Privacy in India: Attitudes and Awareness," Privacy Enhancing Technologies, LNCS 3856, Springer, 2006, pp. 243–258.

Index Terms:
Cloud computing, information assurance, cloud vendors, information technology, security and privacy, cybersecurity
Citation:
Rajarshi Chakraborty, Srilakshmi Ramireddy, T.S. Raghu, H.Raghav Rao, "The Information Assurance Practices of Cloud Computing Vendors," IT Professional, vol. 12, no. 4, pp. 29-37, July-Aug. 2010, doi:10.1109/MITP.2010.44
Usage of this product signifies your acceptance of the Terms of Use.