The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2010 vol.12)
pp: 20-27
Khaled M. Khan , Qatar University
ABSTRACT
<p>How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud computing.</p>
INDEX TERMS
Hybrid cloud computing, trust, control on data, private enclave, certification, reflection of security profile, information technology, cloud computing, security and privacy
CITATION
Khaled M. Khan, "Establishing Trust in Cloud Computing", IT Professional, vol.12, no. 5, pp. 20-27, September/October 2010, doi:10.1109/MITP.2010.128
REFERENCES
1. C. Costa and K. Bijlsma-Frankema, "Trust and Control Interrelations," Group and Organization Management, vol. 32, no. 4, 2007, pp. 392–406.
2. M. Lund and B. Solhaug, "Evolution in Relation to Risk and Trust Management," Computer, May 2010, pp. 49–55.
3. D. Gambetta, "Can We Trust Trust?" Trust: Making and Breaking Cooperative Relations, Basil Blackwell, 1988, pp. 213–237.
4. S. Perez, "In Cloud We Trust?" ReadWriteWeb, Jan. 2009; www.readwriteweb.com/enterprise/2009/01in-cloud-we-trust.php .
5. B. Michael, "In Cloud Shall We Trust?" IEEE Security & Privacy, Sept./Oct. 2009, p. 3.
6. B. Dournaee, "Taking Control of the Cloud for Your Enterprise," white paper, Intel SOA Expressway, June 2010.
7. N. Riter, "VMware Unveils Security API," Search Security, Apr. 2009; http://searchsecurity.techtarget.com.au/ articles31679-VMware-unveils-security-API .
8. G. Peterson, "Thinking Person's Guide to the Cloud, Part 3b," blog, 1 Nov. 2009; http://1raindrop.typepad.com/1_raindrop/ 2009/10thinking-persons-guide-to-the-cloud-part-3b.html .
9. D. Blum, "Cloud Computing: Who Is in Control?" Burton Group Blogs' Security and Risk Management Blog, 25 June 2009; http://srmsblog.burtongroup.com/2009/06cloud-computing-who-is-in-control.html .
10. L. Kaufmann, "Can a Trusted Environment Provide Security?" IEEE Security & Privacy, Jan./Feb. 2010, pp. 50–52.
11. J. Boles, "Security and the Cloudy Cloud: A Revolution for the Infrastructure," Computerworld, Oct. 2008; http://blogs.computerworld.comsecurity_in_the_cloud .
12. K. Khan, "Addressing Cloud Computing in Enterprise Architecture," Cutter IT Journal, vol. 22, no. 11, 2009, pp. 27–33.
13. R. Chakraborty et al., "The Information Assurance Practices of Cloud Computing Vendors," IT Professional, July/Aug. 2010, pp. 29–37.
14. T. Ristenpart et al., "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Comm. Security, ACM Press, 2009, pp. 199–212.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool