A cross section of the issues and research activities related to both information security and cloud computing

Naresh K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, John M. Acken

Research output: Contribution to journalArticle

23 Citations (Scopus)

Abstract

Cloud computing amplifies computer security issues that have proliferated with the growth of the Internet. A broad range of security research is being applied to cloud computing. This paper gives a description of cloud computing followed by a general description of information security issues and solutions, and a brief description of issues linking cloud computing with information security. Security solutions must make a trade-off between the amount of security and its performance cost and impact on the end-user experiences. This is accentuated in a cloud computing environment where users desiring different levels of security share the same resources. An essential issue for cloud computing is the perception of security, which is beyond the simple technical details of security solutions. This paper includes a list of a few key information security challenges that also present significant research opportunities. Solving these key problems will encourage the widespread adoption of cloud computing.

Original languageEnglish (US)
Pages (from-to)279-291
Number of pages13
JournalIETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)
Volume28
Issue number4
DOIs
StatePublished - Jul 2011
Externally publishedYes

Fingerprint

Security of data
Cloud computing
Internet
Costs

Keywords

  • Cloud computing
  • Information security
  • Virtualization

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

A cross section of the issues and research activities related to both information security and cloud computing. / Sehgal, Naresh K.; Sohoni, Sohum; Xiong, Ying; Fritz, David; Mulia, Wira; Acken, John M.

In: IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), Vol. 28, No. 4, 07.2011, p. 279-291.

Research output: Contribution to journalArticle

Sehgal, Naresh K. ; Sohoni, Sohum ; Xiong, Ying ; Fritz, David ; Mulia, Wira ; Acken, John M. / A cross section of the issues and research activities related to both information security and cloud computing. In: IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India). 2011 ; Vol. 28, No. 4. pp. 279-291.
@article{176ec0d670234c29b2c5eb6fe1e07a1a,
title = "A cross section of the issues and research activities related to both information security and cloud computing",
abstract = "Cloud computing amplifies computer security issues that have proliferated with the growth of the Internet. A broad range of security research is being applied to cloud computing. This paper gives a description of cloud computing followed by a general description of information security issues and solutions, and a brief description of issues linking cloud computing with information security. Security solutions must make a trade-off between the amount of security and its performance cost and impact on the end-user experiences. This is accentuated in a cloud computing environment where users desiring different levels of security share the same resources. An essential issue for cloud computing is the perception of security, which is beyond the simple technical details of security solutions. This paper includes a list of a few key information security challenges that also present significant research opportunities. Solving these key problems will encourage the widespread adoption of cloud computing.",
keywords = "Cloud computing, Information security, Virtualization",
author = "Sehgal, {Naresh K.} and Sohum Sohoni and Ying Xiong and David Fritz and Wira Mulia and Acken, {John M.}",
year = "2011",
month = "7",
doi = "10.4103/0256-4602.83549",
language = "English (US)",
volume = "28",
pages = "279--291",
journal = "IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)",
issn = "0256-4602",
publisher = "Medknow Publications and Media Pvt. Ltd",
number = "4",

}

TY - JOUR

T1 - A cross section of the issues and research activities related to both information security and cloud computing

AU - Sehgal, Naresh K.

AU - Sohoni, Sohum

AU - Xiong, Ying

AU - Fritz, David

AU - Mulia, Wira

AU - Acken, John M.

PY - 2011/7

Y1 - 2011/7

N2 - Cloud computing amplifies computer security issues that have proliferated with the growth of the Internet. A broad range of security research is being applied to cloud computing. This paper gives a description of cloud computing followed by a general description of information security issues and solutions, and a brief description of issues linking cloud computing with information security. Security solutions must make a trade-off between the amount of security and its performance cost and impact on the end-user experiences. This is accentuated in a cloud computing environment where users desiring different levels of security share the same resources. An essential issue for cloud computing is the perception of security, which is beyond the simple technical details of security solutions. This paper includes a list of a few key information security challenges that also present significant research opportunities. Solving these key problems will encourage the widespread adoption of cloud computing.

AB - Cloud computing amplifies computer security issues that have proliferated with the growth of the Internet. A broad range of security research is being applied to cloud computing. This paper gives a description of cloud computing followed by a general description of information security issues and solutions, and a brief description of issues linking cloud computing with information security. Security solutions must make a trade-off between the amount of security and its performance cost and impact on the end-user experiences. This is accentuated in a cloud computing environment where users desiring different levels of security share the same resources. An essential issue for cloud computing is the perception of security, which is beyond the simple technical details of security solutions. This paper includes a list of a few key information security challenges that also present significant research opportunities. Solving these key problems will encourage the widespread adoption of cloud computing.

KW - Cloud computing

KW - Information security

KW - Virtualization

UR - http://www.scopus.com/inward/record.url?scp=80052173864&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80052173864&partnerID=8YFLogxK

U2 - 10.4103/0256-4602.83549

DO - 10.4103/0256-4602.83549

M3 - Article

VL - 28

SP - 279

EP - 291

JO - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)

JF - IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)

SN - 0256-4602

IS - 4

ER -