2010
DOI: 10.1109/mitp.2010.44
|View full text |Cite
|
Sign up to set email alerts
|

The Information Assurance Practices of Cloud Computing Vendors

Abstract: Cloud computing has fostered many concerns about security, privacy, and business integrity. How do information assurance practices differ based on a cloud vendor's service offering, amount of online traffic, and company size?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(28 citation statements)
references
References 10 publications
0
28
0
Order By: Relevance
“…[24] highlight that multitenancy may enable information leakage and increase attack surface. Moreover [25], [26], and [27] considered multitenancy as a serious issue in cloud security.…”
Section: Issn: 2320-5407mentioning
confidence: 99%
“…[24] highlight that multitenancy may enable information leakage and increase attack surface. Moreover [25], [26], and [27] considered multitenancy as a serious issue in cloud security.…”
Section: Issn: 2320-5407mentioning
confidence: 99%
“…Cloud users may think that Cloud computing simplifies security issues for users by outsourcing the responsibility to another party who is presumed to be highly skilled in such matters (Anthes, 2010). Industry practitioners have reported that security was a critical concern in the initial stages of Cloud computing adoption (Chakraborty et al, 2010;McCabe & Hancock, 2009). Bhayal (2011) stated that Cloud security is the most important concern among Cloud clients, as the data owner does not know where the data are stored and data hosts cannot be considered completely reliable.…”
Section: Cloud Securitymentioning
confidence: 99%
“…This approach to application delivery is part of the utility computing model where all of the technology is in the "cloud" accessed over the Internet as a service. It is an approach whereby data is permanently stored on remote servers accessible via the Internet and cached temporarily on client devices that may include desktops, tablet computers, notebooks, handheld devices, mobile phones, etc., and is frequently called Software as a Service (SaaS) [9].…”
Section: Software As a Service (Saas)mentioning
confidence: 99%
“…It facilitates the deployment of customer created applications to the cloud using provider-supported frameworks, including APIs based on Java, Python, or .Net. Although the consumers don't control the underlying cloud Infrastructure, they have control over the deployed applications and hosting environment configurations [9].…”
Section: Platform As a Service (Paas)mentioning
confidence: 99%
See 1 more Smart Citation