Addressing the challenges in securing the cloud

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

Security is perhaps the most dominant concern for accelerated and widespread acceptance of the emerging cloud computing paradigm. This paradigm is essentially an evolution of multi-tenancy and remote computing architecture. It is therefore not surprising that resource sharing, virtualization, cross-site scripting, malware, and similar concepts may result in increased risk and security vulnerabilities. Some of these vulnerabilities arise from the distributed nature of cloud computing. From this category, we will discuss insecure APIs, distributed denial of service attacks. To provide confidentiality and authentication services, the public key infrastructure is extensively used by the cloud servers and clients. In this work, we will discuss their potential flaws that may be inherited by the cloud environments. To facilitate a systemic approach to addressing the challenges in securing the cloud computing environments, we categorize their vulnerabilities and the threats they face. We then focus on issues in achieving data confidentiality through symmetric key cryptography. Illustrating the inefficiencies of this approach, we argue that data-centric and homomorphic encryption methodologies can provide solutions that are more suitable for cloud computing paradigms.
Original languageEnglish
Title of host publicationProceedings of the 19th International Business Information Management Association Conference, November 12-13, 2012, Barcelona, Spain: Innovation Vision 2020: Sustainable Growth, Entrepreneurship, and Economic Development
PublisherIBIMA
Pages1467-1476
Number of pages10
ISBN (Print)9780982148983
Publication statusPublished - 2012
EventInternational Business Information Management Association. Conference -
Duration: 12 Nov 2012 → …

Conference

ConferenceInternational Business Information Management Association. Conference
Period12/11/12 → …

Keywords

  • cloud computing
  • computer networks
  • cryptography
  • security measures

Fingerprint

Dive into the research topics of 'Addressing the challenges in securing the cloud'. Together they form a unique fingerprint.

Cite this