This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Hide and Seek in the Cloud
March/April 2010 (vol. 8 no. 2)
pp. 57-58
Marjory S. Blumenthal, Georgetown University
Cloud computing promises much, but the hype might lure people into complacency. A narrowly negative depiction can help get people to think about the threats to security and privacy. We need to consider these threats carefully as we move toward a cloud-computing ecosystem.

1. T. Ristenpart et al., "Hey, You, Get Off of My Cloud," Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 199–212.

Index Terms:
cloud computing, security and privacy, cybercrime, virtual machines
Citation:
Marjory S. Blumenthal, "Hide and Seek in the Cloud," IEEE Security & Privacy, vol. 8, no. 2, pp. 57-58, March-April 2010, doi:10.1109/MSP.2010.70
Usage of this product signifies your acceptance of the Terms of Use.