Enhancing Cloud Security through Policy Monitoring Techniques

作者: B. Loganayagi , S. Sujatha

DOI: 10.1007/978-3-642-25734-6_40

关键词:

摘要: Cloud Computing is accessing Services through Internet based on pay per usage model. Software as a Service (SaaS), Infrastructure (IaaS) and Platform (PaaS) are available in Cloud. products will eliminate the need to install manage client rich applications. providers helping companies reduce high cost infrastructure installation maintenance cost. Besides having enormous useful features, cloud has some issues like security. This paper provides details about computing issues, how policy monitoring techniques can be used enhance security of cloud.

参考文章(15)
Shahed Latif, Tim Mather, Subra Kumaraswamy, Cloud security and privacy No Category. ,vol. 338, ,(2009)
John Rittinghouse, James Ransome, Cloud Computing: Implementation, Management, and Security ,(2009)
Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn, SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops. pp. 393- 398 ,(2010) , 10.1109/COMPSACW.2010.74
S. Bertram, M. Boniface, M. Surridge, N. Briscombe, M. Hall-May, On-Demand Dynamic Security for Risk-Based Secure Collaboration in Clouds 2010 IEEE 3rd International Conference on Cloud Computing. pp. 518- 525 ,(2010) , 10.1109/CLOUD.2010.83
Xue Jing, Zhang Jian-jun, A Brief Survey on the Security Model of Cloud Computing 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science. pp. 475- 478 ,(2010) , 10.1109/DCABES.2010.103
James McGovern, Gunnar Peterson, 10 Quick, Dirty, and Cheap Things to Improve Enterprise Security ieee symposium on security and privacy. ,vol. 8, pp. 83- 85 ,(2010) , 10.1109/MSP.2010.61
Gunnar Peterson, Don't Trust. And Verify: A Security Architecture Stack for the Cloud ieee symposium on security and privacy. ,vol. 8, pp. 83- 86 ,(2010) , 10.1109/MSP.2010.149
Lori M. Kaufman, Data Security in the World of Cloud Computing ieee symposium on security and privacy. ,vol. 7, pp. 61- 64 ,(2009) , 10.1109/MSP.2009.87
Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, None, Security and Privacy in Cloud Computing: A Survey semantics, knowledge and grid. pp. 105- 112 ,(2010) , 10.1109/SKG.2010.19
Hassan Takabi, James B.D. Joshi, Gail-Joon Ahn, Security and Privacy Challenges in Cloud Computing Environments ieee symposium on security and privacy. ,vol. 8, pp. 24- 31 ,(2010) , 10.1109/MSP.2010.186