Abstract
Cloud Computing is a revolutionary trend that not only minimizes the processing cost but also enhances the Return on Investment (ROI) despite that several risks are still challenging the paradigm. To ensure the confidentiality, integrity and availability of crucial data in the Cloud, policies and processes must be created to address this expanded reliance on these extended models. Although there is presence of SLA (Service Level Agreement) and NDA (Non-disclosure agreement), "It’s not enough for everybody. Some people do want to go deeper." There are lots of questions which are still un-answered. For instance regulatory compliance, location of data centers, its physical and network security etc. Although Cloud Computing is an excellent outsourcing idea, many believe that it also presents a long list of legal and other security concerns. In this paper we are focusing on assessing the various risks present at different layers of Cloud Architecture and their potential consequences and their plausible remedial actions too.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiss, A.: Computing in the Clouds. NetWorker 11(4), 16–25 (2007)
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems 25(6), 599–616 (2009)
Cloud Computing Security, A Trend Micro White Paper (August 2009), http://emea.trendmicro.com/imperia/md/content/uk/solutions/enterprise/wp02_cloud-computing_090812us.pdf
Cloud Expo::Attacks Cannot Be Prevented By Lori MacVittie, http://cloudcomputing.sys-con.com/node/1668772
white paper : On Verifying Stateful Dataflow Processing Services In Large-Scale Cloud Systems, http://www.techrepublic.com/whitepapers/on-verifying-stateful-dataflow-processing-services-in-large-scale-cloud-systems/2417851
Cloud Security Threats and Countermeasures at a GlanceJD Meier (July 8, 2010), http://blogs.msdn.com/b/jmeier/archive/2010/07/08/cloud-security-threats-and-countermeasures-at-a-glance.aspx
http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
http://www-07.ibm.com/in/ibm/cloud/?ca=googleaw&gclid=CPrsyYXb86cCFRFOgwod0kaacg
http://www.intel.com/itcenter/topics/cloud/security.htm?cid=apac:gglcloudsecurity_in_genti17A68s
The “Comparing Google App Engine, Amazon SimpleDB and Microsoft SQL Server Data Services” post of May 6, 2008 to the OakLeaf Systems blog, http://bit.ly/LtvxN, http://oakleafblog.blogspot.com/2008/04/comparing-google-app-engine-amazon.html
Hinchcliffe, Dion. Cloud computing: A new era of IT opportunity and challenges (March 03, 2009), http://blogs.zdnet.com/Hinchcliffe/?p=261&tag=rbxccnbzd1 (retrieved June 03, 2009)
Swaminathan, Kishore S., Daugherty, Paul, Tobolski, Joseph.: What the Enterprise needs to know about Cloud Computing. Accenture Technology Labs, p. 3-15 (2009)
white paper Securing the Cloud, A Review of Cloud Computing, Security Implications and Best Practices, http://www.vmware.com/files/pdf/cloud/VMware-Savvis-Cloud-WP-en.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chhabra, B., Taneja, B. (2011). “Cloud Computing: Towards Risk Assessment”. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)