Security checklist for IaaS cloud deployments

نویسندگان

  • Mihály Héder
  • F. Bisztray
  • Gy. Lakatos
  • G. Malasits
  • P. Ormos
  • E. Prunk-Éger
  • J. Rigó
  • Szabolcs Tenczer
  • Erno Rigó
چکیده

In this article, we provide a cloud-security checklist for IaaS cloud deployments. The elements of the checklist are established by surveying the related literature on cloud-threat models and various security recommendations. We define the elements of the list on a level of abstraction that helps keep the size of the list manageable while preserving the lists practical applicability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Behind the scenes of IaaS implementations

Open source IaaS is hot topic in cloud computing and every year a new IaaS with a different design is announced. This paper provides a closer look into three common IaaS; Eucalyptus, OpenStack & Nimbus. OpenStack is currently the best choice of public cloud providers due to its aim at standardization and scalability while Eucalyptus is more appropriate for private cloud deployments.

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Configuring Cloud Deployments for Integrity

Many cloud vendors now provide pre-configured OS distributions and network firewall policies to simplify deployment for customers. However, even with this help, customers have little insight into the possible attack paths that adversaries may use to compromise the integrity of their computations on the cloud. In this paper, we leverage the pre-configured security policies for cloud instances to...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Scalable and Secure Multi Cloud Architecture for IaaS to Address the Performance Issues

Security is an important concern to improve in emerging cloud computing to store, manage, analyze and share the sensitive data. Infrastructure as a Service (IaaS) is a provision cloud model attracting all business customers to use cloud by offering on-demand and pay-per-use hardware, storage, servers and other networking components. Present single cloud architectures are having numerous securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1608.08787  شماره 

صفحات  -

تاریخ انتشار 2016