This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Can Public-Cloud Security Meet Its Unique Challenges?
July/August 2010 (vol. 8 no. 4)
pp. 55-57
Lori M. Kaufman, BAE Systems
Because cloud-computing environments' security vulnerabilities differ from those of traditional data centers, perimeter-security approaches will no longer work. Security must move from the perimeter to the virtual machines.

1. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," ver. 15, US Nat'l Inst. of Standards and Technology, 7 Oct. 2009; http://csrc.nist.gov/groups/SNS/cloud-computing cloud-def-v15.doc.
2. 2010 State of Virtualization Security Survey, Prism Microsystems, Apr. 2010; www.prismmicrosys.com/documentsVirtualizationSecuritySurvey2010.pdf .
3. J.W. Rittinghouse and J.F. Ransome, "Cloud Security Challenges," Cloud Computing: Implementation, Management, and Security, CRC Press, 2009, pp. 158–161; www.infosectoday.com/ArticlesCloud_Security_Challenges.htm .
4. Cloud Computing Security: Making Virtual Machines Cloud-Ready, Trend Micro, Aug. 2009.

Index Terms:
cloud computing, virtualization, virtual machines data centers, security and privacy
Citation:
Lori M. Kaufman, "Can Public-Cloud Security Meet Its Unique Challenges?," IEEE Security & Privacy, vol. 8, no. 4, pp. 55-57, July-Aug. 2010, doi:10.1109/MSP.2010.120
Usage of this product signifies your acceptance of the Terms of Use.