Issue No.02 - March/April (2010 vol.8)
Marjory S. Blumenthal , Georgetown University
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.70
Cloud computing promises much, but the hype might lure people into complacency. A narrowly negative depiction can help get people to think about the threats to security and privacy. We need to consider these threats carefully as we move toward a cloud-computing ecosystem.
cloud computing, security and privacy, cybercrime, virtual machines
Marjory S. Blumenthal, "Hide and Seek in the Cloud", IEEE Security & Privacy, vol.8, no. 2, pp. 57-58, March/April 2010, doi:10.1109/MSP.2010.70