Issue No. 01 - January/February (2010 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.45
Trent Jaeger , The Pennsylvania State University
Joshua Schiffman , The Pennsylvania State University
Cloud computing presents an opportunity to offload computing to third party resources, but this business model isn't without security risks. Customers must determine if running their computing on a base system managed by a third party is better than running on their own systems. They must be convinced that running in the same data center as their competitors or adversaries is safe, and they are still responsible for complex security configuration. Despite these concerns, cloud vendors can also leverage the cloud architecture to improve security by building verifiable base systems, designing integrity-protected cloud services, and limiting security configuration complexity. Thus, while the cloud architecture provides security challenges, there are also opportunities to ease the security configuration burden on customers.
cloud computing, access control, network security
J. Schiffman and T. Jaeger, "Outlook: Cloudy with a Chance of Security Challenges and Improvements," in IEEE Security & Privacy, vol. 8, no. , pp. 77-80, 2010.