This Article 
 Bibliographic References 
 Add to: 
Can Public-Cloud Security Meet Its Unique Challenges?
July/August 2010 (vol. 8 no. 4)
pp. 55-57
Lori M. Kaufman, BAE Systems
Because cloud-computing environments' security vulnerabilities differ from those of traditional data centers, perimeter-security approaches will no longer work. Security must move from the perimeter to the virtual machines.

1. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," ver. 15, US Nat'l Inst. of Standards and Technology, 7 Oct. 2009; cloud-def-v15.doc.
2. 2010 State of Virtualization Security Survey, Prism Microsystems, Apr. 2010; .
3. J.W. Rittinghouse and J.F. Ransome, "Cloud Security Challenges," Cloud Computing: Implementation, Management, and Security, CRC Press, 2009, pp. 158–161; .
4. Cloud Computing Security: Making Virtual Machines Cloud-Ready, Trend Micro, Aug. 2009.

Index Terms:
cloud computing, virtualization, virtual machines data centers, security and privacy
Lori M. Kaufman, "Can Public-Cloud Security Meet Its Unique Challenges?," IEEE Security & Privacy, vol. 8, no. 4, pp. 55-57, July-Aug. 2010, doi:10.1109/MSP.2010.120
Usage of this product signifies your acceptance of the Terms of Use.