The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2012 vol.14)
pp: 6-8
Peter Mell , US National Institute of Standards and Technology
ABSTRACT
Although cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it's not clear what security issues are particular to cloud computing. To approach this question, the author attempts to derive cloud security issues from various cloud definitions and a reference architecture.
INDEX TERMS
cloud computing, cloud security
CITATION
Peter Mell, "What's Special about Cloud Security?", IT Professional, vol.14, no. 4, pp. 6-8, July-Aug. 2012, doi:10.1109/MITP.2012.84
REFERENCES
1. “IT Cloud Services User Survey, Part 2,” IDC Enterprise Panel, Aug. 2008 www.clavister.com/documents/resources/white-papers clavister-whp-security-in-the-cloud-gb.pdf .
2. “Cloud Computing: Benefits, Risks, and Recommendations for information Security,” European Network and Information Security Agency, Nov. 2009; www.enisa.europa.eu/act/rm/files/deliverables/ cloud-computing-risk-assessment/at_download fullReport.
3. “Final Version of NIST Cloud Computing Definition Published,” NIST Tech Beat,25 Oct. 2011; www.nist.gov/itl/csdcloud-102511.cfm.
4. F. Liu et al., NIST Cloud Computing Reference Architecture, NIST recommendation, Sept. 2011; http://collaborate.nist.gov/twiki-cloud-computing/ pub/CloudComputing/ReferenceArchitectureTaxonomy NIST_SP_500-292_-_090611.pdf .
5. “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” Cloud Security Alliance, Dec. 2009; https://cloudsecurityalliance.org/wp-content/ uploads/2011/07csaguide.v2.1.pdf.
6. “Cloud Controls Matrix, Version 1.2” Cloud Security Alliance, Aug. 2011; https://cloudsecurityalliance.org/research/ initiativesccm.
7. S. VanRoekel, “Memorandum for Chief Information Officers,” Executive Office of the President, 8 Dec. 2011, footnotes 5 and 6; www.cio.govfedrampmemo.pdf.
77 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool