Abstract
Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professionals define the security rules, guidelines and best practices of the IT infrastructure of a given organization at the network, host and application levels. The current paper discusses miscellaneous problems of providing the infrastructure security. The different aspects of data security are given a special attention, especially data and its security. The main components of cloud infrastructure security are defined and the corresponding issues and recommendations are given.
Chapter PDF
Similar content being viewed by others
References
Cloud Computing, http://en.wikipedia.org/wiki/Cloud_computing
Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives. An ISACA Emerging Technology White Paper, http://www.isaca.org
Dhanjani, N., Rios, B., Hardi, B.: acking: The Next Generation. HO’Reilly Media, Inc., Sebastopol (2009)
ENISA.: Cloud Computing: Information Assurance Framework. ENISA (November 2009), http://www.enisa.europa.eu/
ENISA.: Cloud Computing: Benefits, risks and recommendations for information security. ENISA (November 2009), http://www.enisa.europa.eu/
Lyong, L.: How to Select a Cloud Computing Infrastructure Provider. Gartner, Inc. Research. ID Number: G00166565
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media, Inc., Sebastopol (2009)
Owens, K.: Securing Virtual Compute Infrastructure in the Cloud. White Paper: Cloud Computing, http://www.savvis.net
Reese, G.: Cloud Application Architectures: Building Applications and Infrastructure in the Cloud. O’Reilly Media, Inc., Sebastopol (2009)
Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management and Security. CRC Press, Boca Raton (2009)
Secure Cloud Architecture, NetApp, WP-7083-0809 (August 2009)
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance (2009), http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
Securing Microsoft’s Cloud Infrastructure. A Microsoft White Paper, http://blogs.technet.com/gfs/archive/2009/05/27/securing-microsoft-s-cloud-infrastructure.aspx
The Role of Security in Trustworthy Cloud Computing. RSA, White paper, http://www.rsa.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Velev, D., Zlateva, P. (2011). Cloud Infrastructure Security. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds) Open Research Problems in Network Security. iNetSec 2010. Lecture Notes in Computer Science, vol 6555. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19228-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-19228-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19227-2
Online ISBN: 978-3-642-19228-9
eBook Packages: Computer ScienceComputer Science (R0)