Understanding Cloud Computing Vulnerabilities

被引:286
作者
Grobauer, Bernd
Walloschek, Tobias
Stoecker, Elmar
机构
[1] Siemens, United States
关键词
Cloud computing; Security; Frequency; Taxonomy; Privacy; ISO standards; Information services; Web sites; Internet; Vocabulary; network security; Risk management; software engineering; emerging technologies; cloud computing; computer systems organization; security;
D O I
10.1109/MSP.2010.115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact difficult for two primary reasons. First, as is true for many discussions about risk, basic vocabulary such as "risk," "threat," and "vulnerability" are often used as if they were interchangeable, without regard to their respective definitions. Second, not every issue that's raised is really specific to cloud computing. We can achieve an accurate understanding of the security issue "delta" that cloud computing really adds by analyzing how cloud computing influences each risk factor. One important factor concerns vulnerabilities: cloud computing makes certain well-understood vulnerabilities more significant and adds new vulnerabilities. Here, the authors define four indicators of cloud-specific vulnerabilities, introduce a security-specific cloud reference architecture, and provide examples of cloud-specific vulnerabilities for each architectural component. © 2011 IEEE.
引用
收藏
页码:50 / 57
页数:8
相关论文
共 5 条
[1]  
[Anonymous], 2008, P 2008 GRID COMP ENV, DOI DOI 10.1109/GCE.2008.4738443
[2]  
[Anonymous], CLOUD COMP BEN RISK
[3]  
GROSSE E, 2010, COMMUNICATION
[4]  
*INT ORG STAND, 2007, 270052007 ISOIEC
[5]  
Mell P., 2009, EFFECTIVELY SECURELY