Issue No.03 - May/June (2011 vol.9)
Jonathan Spring , Software Engineering Institute
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2011.57
This article presents a set of recommended restrictions and audits to facilitate cloud security. Monitoring cloud computing is complex; although outsourcing the decision might appear to simplify the problem, it might raise as many questions as it answers. By analyzing what the cloud provider and the customer are each responsible for at each cloud layer, it becomes easier to manage auditing and security monitoring.
cloud computing, software as a service, platform as a service, infrastructure as a service, computer networks, middleware, computer security, network security
Jonathan Spring, "Monitoring Cloud Computing by Layer, Part 2", IEEE Security & Privacy, vol.9, no. 3, pp. 52-55, May/June 2011, doi:10.1109/MSP.2011.57