Security issues of cloud computing environment in possible military applications

  • Andreja Samčović Univerzitet u Beogradu, Saobraćajni fakultet, Odsek za poštanski i telekomunikacioni saobraćaj
Keywords: Telecommunications, evolution, Computing, clouds,

Abstract


The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing and telecommunications. Although there are many benefits of adopting cloud computing, there are also some significant barriers to adoption, where the most important are security issues. This paper introduces the concept of cloud computing; looks at relevant technologies in cloud computing; takes into account some market potentials and applications as well as some cloud deployment models. Additionally, Security-as-a-Service is specially considered because of its importance in the military applications.

Author Biography

Andreja Samčović, Univerzitet u Beogradu, Saobraćajni fakultet, Odsek za poštanski i telekomunikacioni saobraćaj

Odsek za poštanski i telekomunikacioni saobraćaj

vanredni profesor

References

Benoit, April 2009, Trends for 2008, Symantec’s Global Internet Security Threat Report, Vol. XIV, p.10.

Caceres, J., Vaquero, L., Polo, A., 2010, Service Scalability over the Cloud’, Handbook of Cloud Computing, Springer, USA, pp.357-377.

Carlin, S., Curran, K., January-March 2011, Cloud Computing Security, International Journal of Ambient Computing and Intelligence, UK, pp.14-19.

Cayirci, E. et al., 2009, Snow leopard cloud: a multi-national education training and experimentation cloud and its security challenges, Cloud Computing, pp.57-68.

CloudAV: N-Version Antivirus in the Network Cloud, USENIX Conference, San Jose, California, July 2008.

Choo, K.K.R., 2010, Cloud computing: Challenges and future directions, Trends&issues in crime and criminal justice, No.400, Australian Institute of Criminology, Australia, pp.1-6.

Đekić, M., Za bolje iskorišćenje, Svet kompjutera, dostupno na: http://www.sk.rs/2008/04/skse01.html

Mather, T., Kumaraswamy, S., Latif, S., 2009, Cloud Security and Privacy, First edition, O’Reilly, USA.

Nick, J., Cohen, D., Kaliski, B., 2010, Key enabling Technologies for Virtual Private Clouds, Handbook of Cloud Computing, Springer, USA, pp.47-63.

Sangroya, A., 2010, Towards Analyzing Data Security Risks in Cloud Computing Environments, pp.255-265, ICISTM 2010, Germany.

Urošević, V., 2011, Visokotehnološki kriminal u cloud computing okruženju – rizici i pretnje, str. 8-13, Konferencija o bezbednosti informacija BISEC 2011, Beograd, Srbija, juni 2011.

Vecchiola, C., Xingchen C., Rajkumar, B., 2009, Aneka: a software platform for .NET-based cloud computing, High Speed and Large Scale Scientific Computing, pp.267-295.

Wyld, D., 2009, Moving to the cloud: an introduction to cloud computing in government, IBM Center for the business of government.

http://googleblog.blogspot.com/2007/09/weve-officially-acquired-postini.html, preuzeto: 14.09.2012.

Published
2013/02/20
Section
Professional Papers