Abstract
The rise of Cloud Computing represents one of the most significant shifts in Information technology in the last 5 years and promises to revolutionise how we view the availability and consumption of computing storage and processing resources. However, it is well-known that along with the benefits of Cloud Computing, it also presents a number of security issues that have restricted its deployment to date. This chapter reviews the potential vulnerabilities of Cloud-based architectures and uses this as the foundation to define a set of requirements for reassessing risk management in Cloud Computing. To fulfill these requirements, the authors propose a new scheme for the real-time assessment and auditing of risk in cloud-based applications and explore this with the use case of a triage application.
Original language | English |
---|---|
Title of host publication | Security Engineering for Cloud Computing |
Subtitle of host publication | Approaches and Tools |
Publisher | IGI Global |
Number of pages | 23 |
ISBN (Print) | 9781466621251 |
DOIs | |
Publication status | Published - 2013 |