作者: Acklyn Murray , Geremew Begna , Ebelechukwu Nwafor , Jeremy Blackstone , Wayne Patterson
DOI: 10.1109/SECON.2015.7132979
关键词: Access control 、 Information security management 、 Cloud testing 、 Enterprise architecture 、 Computer security 、 Cloud computing security 、 Cloud computing 、 Software as a service 、 Computer science 、 Security service
摘要: Cloud computing is one of today's most appealing technology areas due to its cost-efficiency and flexibility. However, despite significant interests, deploying cloud in an enterprise infrastructure offers security concerns. Successful implementation requires proper planning understanding emerging risks, threats, vulnerabilities, possible countermeasures. This paper discusses concerns the three models namely “Software as a Service” (SaaS), Platform (PaaS) “Infrastructure (IaaS). It also Cloud-based Security Tools currently available today. Under U.S. Federal Requirements for Security. The demonstrated Information Management Act (FISMA) Risk Authorization Program (FedRAMP). Data Encryption, Homomorphic Encryption Access Control (Identity Management). Finally, this talks about applications focusing on select applications. looks at some known vulnerability issues associated with future