Security issues of cloud computing environment in possible military applications
Abstract
The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing and telecommunications. Although there are many benefits of adopting cloud computing, there are also some significant barriers to adoption, where the most important are security issues. This paper introduces the concept of cloud computing; looks at relevant technologies in cloud computing; takes into account some market potentials and applications as well as some cloud deployment models. Additionally, Security-as-a-Service is specially considered because of its importance in the military applications.
References
Benoit, April 2009, Trends for 2008, Symantec’s Global Internet Security Threat Report, Vol. XIV, p.10.
Caceres, J., Vaquero, L., Polo, A., 2010, Service Scalability over the Cloud’, Handbook of Cloud Computing, Springer, USA, pp.357-377.
Carlin, S., Curran, K., January-March 2011, Cloud Computing Security, International Journal of Ambient Computing and Intelligence, UK, pp.14-19.
Cayirci, E. et al., 2009, Snow leopard cloud: a multi-national education training and experimentation cloud and its security challenges, Cloud Computing, pp.57-68.
CloudAV: N-Version Antivirus in the Network Cloud, USENIX Conference, San Jose, California, July 2008.
Choo, K.K.R., 2010, Cloud computing: Challenges and future directions, Trends&issues in crime and criminal justice, No.400, Australian Institute of Criminology, Australia, pp.1-6.
Đekić, M., Za bolje iskorišćenje, Svet kompjutera, dostupno na: http://www.sk.rs/2008/04/skse01.html
Mather, T., Kumaraswamy, S., Latif, S., 2009, Cloud Security and Privacy, First edition, O’Reilly, USA.
Nick, J., Cohen, D., Kaliski, B., 2010, Key enabling Technologies for Virtual Private Clouds, Handbook of Cloud Computing, Springer, USA, pp.47-63.
Sangroya, A., 2010, Towards Analyzing Data Security Risks in Cloud Computing Environments, pp.255-265, ICISTM 2010, Germany.
Urošević, V., 2011, Visokotehnološki kriminal u cloud computing okruženju – rizici i pretnje, str. 8-13, Konferencija o bezbednosti informacija BISEC 2011, Beograd, Srbija, juni 2011.
Vecchiola, C., Xingchen C., Rajkumar, B., 2009, Aneka: a software platform for .NET-based cloud computing, High Speed and Large Scale Scientific Computing, pp.267-295.
Wyld, D., 2009, Moving to the cloud: an introduction to cloud computing in government, IBM Center for the business of government.
http://googleblog.blogspot.com/2007/09/weve-officially-acquired-postini.html, preuzeto: 14.09.2012.
Proposed Creative Commons Copyright Notices
Proposed Policy for Military Technical Courier (Journals That Offer Open Access)
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).