Towards the design of secure and privacy-oriented Information\ud systems in the cloud: Identifying the major concepts

Article English OPEN
Kalloniatis, Christos; Mouratidis, Haralambos; Vassilis, Manousakis; Islam, Shareeful; Gritzalis, Stefanos; Kavakli, Evangelia;

Cloud computing is without a doubt one of the most significant innovations presented in the\ud global technological map. This new generation of technology has the potential to positively\ud change our lives since on the one hand it provides capabilities that make our di... View more
  • References (3)

    Threat #1: Abuse and Nefarious Use of Cloud Computing Threat #2: Insecure interfaces and APIs Threat #3: Malicious Insiders Threat #4: Shared technology issues Threat #5: Data Loss or Leakage Threat #6: Account or Service Hijacking Threat #7: Unknown Risk Profile Threat #8: Privileged user access Threat #9: Regulatory Compliance Threat #10: Data Location Threat #11: Lack of Data Segregation Threat #12: Lack of Recovery Threat #13: Investigate Support Threat #14: Long-term Viability [52] M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, & E. Weippl. “Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space”. Proceedings of Usenix Security, 2011.

    [53] A. Khajeh-Hosseini, I. Sommerville , J. Bogaerts, , & P. Teregowda, “Decision Support Tools for Cloud Migration in the Enterprise”, In proceeding of IEEE 4th International Conference on Cloud Computing. IEEE Computer Society, 2011.

    [54] B. Grobauer, & T. Walloschek, & E. Stocker, “Understanding Cloud Computing Vulnerabilities”, IEEE Security & Privacy Magazine, Vol. 9, No. 2, pp. 50-57, 2011.

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    FromNumber Of ViewsNumber Of Downloads
    ROAR at University of East London - IRUS-UK 0 12
Share - Bookmark