SlideShare a Scribd company logo
Security and Privacy Challenges in Cloud Computing Environments
Security and Privacy Challenges in
Cloud Computing Environments
Presentation
By: Mr. Eyob Sisay (RM0231/10),
School of Electrical and Computer Engineering,
Jimma Institute of Technology,
Jimma University,
Ethiopia
W e l c o m e !
Discussion Points:
 Introduction
 Unique Security and Privacy Implications
 Security and Privacy Challenges
 Security and Privacy Approaches
 Conclusions
8/16/2018Eyob S.
I n t r o d u c t i o n
 Cloud computing could significantly enhance collaboration,
agility, and scale, thus enabling global computing model.
 Five Key Characteristics:
1. On demand self-service
2. Ubiquitous network access
3. Location independent resource pooling
4. Rapid elasticity
5. Measured service - automated resource allocation, load balancing, and metering tools.
18/16/2018Eyob S.
2
Cont..
8/16/2018Eyob S.
 The three key cloud delivery models:
1. Software as a Service (SaaS)
 application software as on-demand services
2. Platform as a Service (PaaS)
 programming environments
3. Infrastructure as a Service (IaaS)
 virtualized infrastructural components: VMs, storages
 Four Cloud deployment models:
 public, private, community, and
 hybrid clouds.
Unique Security and Privacy
Implications in Cloud Computing
 Outsourcing Data and Applications
 only authorized entities can gain access
 Clients need to have significant trust in their provider’s technical
competence and economic stability.
 Extensibility and Shared Responsibility
 The sharing levels will differ for different delivery models
 Issues: access policies, application deployment, and data access and
protection to provide a secure, multi-tenant environment.
38/16/2018Eyob S.
4
Cont..
8/16/2018Eyob S.
 Service-Level Agreements
 The on-demand service or utility-based economic model, dynamicity
 to build a new layer to support a contract negotiation phase between
service providers and consumers, to monitor contract enforcement.
 Virtualization and Hypervisors
 abstract infrastructure and resources exist to clients as isolated VMs.
 multiple operating systems run on a host computer concurrently
 Heterogeneity
 a potential issue with vertical heterogeneity and multi-tenant env’t,
 Compliance and Regulations
 cloud services accessible from anywhere and at anytime.
Security and Privacy Challenges
 Authentication and Identity Management
 Existing password-based authentication has an inherited limitation
 multi-jurisdiction, and providers must segregate customer identity
 Access Control and Accounting
 The access control models must capture relevant aspects of SLAs.
 The utility model of clouds demands proper accounting of user and
service activities. The outsourcing and multi-tenancy aspects of
clouds could accelerate customers’ fears about accounting logs.
58/16/2018Eyob S.
6
Cont..
8/16/2018Eyob S.
 Trust Management and Policy Integration
 mechanisms are necessary to ensure that a dynamic collaboration is
handled securely and that security breaches are effectively monitored
during the interoperation process.
 Secure-Service Management
 the traditional WSDL can’t fully meet the requirements of cloud
computing services description.
 Privacy and Data Protection
 Many organizations aren’t comfortable storing their data and
applications on systems that reside outside of their datacenters.
 Organizational Security Management
 Existing security mgn’t and information security life-cycle models
significantly change when enterprises adopt cloud computing.
Security and Privacy Approaches
 Authentication and Identity Management
 Access Control Needs
 Secure Interoperation
 Secure-Service Provisioning and Composition
 Trust Management Framework
 Data-Centric Security and Privacy
 Managing Semantic Heterogeneity
78/16/2018Eyob S.
8
Cont..
8/16/2018Eyob S.
 Authentication and Identity Management
 mechanisms are necessary to ensure that a dynamic collaboration is
handled securely and that security breaches are effectively monitored
during the interoperation process.
 Access Control Needs
 the traditional WSDL can’t fully meet the requirements of cloud
computing services description.
 Secure Interoperation
 Many organizations aren’t comfortable storing their data and
applications on systems that reside outside of their datacenters.
 Organizational Security Management
 Existing security mgn’t and information security life-cycle models
significantly change when enterprises adopt cloud computing.
9
Cont..
8/16/2018Eyob S.
 Trust Management and Policy Integration
 mechanisms are necessary to ensure that a dynamic collaboration is
handled securely and that security breaches are effectively monitored
during the interoperation process.
 Trust Management Framework
 the traditional WSDL can’t fully meet the requirements of cloud
computing services description.
 Data-Centric Security and Privacy
 Many organizations aren’t comfortable storing their data and
applications on systems that reside outside of their datacenters.
 Managing Semantic Heterogeneity
 Existing security mgnt and information security life-cycle models
significantly change when enterprises adopt cloud computing.
C o n c l u s i o n
 The existing security and privacy solutions must be critically
reevaluated with regard to their appropriateness for clouds.
 Many enhancements in existing solutions and newer solutions
are urgently needed to ensure that cloud computing benefits
are fully realized as its adoption accelerates.
 Cloud computing is still in its infancy, and changes in
security and privacy landscape will impact its successful,
widespread adoption.
8/16/2018Eyob S.
10
Source:
8/16/2018Eyob S.
• Hassan Takabi and James Joshi
• partially supported by US National Science Foundation
grants NSF-IIS-0545912 and NSF-CCF-0720737.
• Gail-Joon Ahn
• partially supported by US National Science Foundation
grants (NSF-IIS-0900970 and NSFCNS-0831360), and
• Department of Energy grants (DESC0004308 and DE-
FG02-03ER25565
8/16/2018Eyob S.

More Related Content

PPTX
Research proposal on Computing Security and Reliability - Phdassistance.com
PhD Assistance
 
POT
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 
DOCX
Information flow control for secure cloud computing
Nexgen Technology
 
PDF
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
ijccsa
 
PDF
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PaaSword EU Project
 
PDF
Security Concerns in Cloud Computing
ijtsrd
 
PPTX
Data security in Hybrid Cloud Computing
Anushkae0001
 
PPTX
Ohm2013 cloud security 101 slideshare
Peter HJ van Eijk
 
Research proposal on Computing Security and Reliability - Phdassistance.com
PhD Assistance
 
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 
Information flow control for secure cloud computing
Nexgen Technology
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
ijccsa
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PaaSword EU Project
 
Security Concerns in Cloud Computing
ijtsrd
 
Data security in Hybrid Cloud Computing
Anushkae0001
 
Ohm2013 cloud security 101 slideshare
Peter HJ van Eijk
 

What's hot (19)

PDF
Cloud computing & IAAS The Dual Edged Sword of New Technology
Mekhi Da ‘Quay Daniels
 
PDF
Ariel Litvin - CCSK
CSAIsrael
 
PDF
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
PPTX
Challenges of Cloud Computing
lavanyamohan45
 
PDF
Cloud Security Governance
BIJ MISHRA
 
PDF
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Unisys Corporation
 
PPTX
Cloud computing security
gangal
 
PDF
IntelAdapt
Maggie Albrecht
 
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
PPTX
CCSK Certificate of Cloud Computing Knowledge - overview
Peter HJ van Eijk
 
PDF
Turtles, Trust and The Future of Cybersecurity
Digital Transformation EXPO Event Series
 
PDF
Secure the modern Enterprise
Microsoft Österreich
 
PDF
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)
ijait
 
PPTX
Five cloud security tips
ServiceMesh
 
PPTX
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
ITpreneurs
 
PDF
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
IJRES Journal
 
PDF
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
DOCX
Security on distributed systems cloud security versus traditional it
ieeepondy
 
PDF
Manage Risk By Protecting the Apps and Data Infographic
Citrix
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Mekhi Da ‘Quay Daniels
 
Ariel Litvin - CCSK
CSAIsrael
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
Challenges of Cloud Computing
lavanyamohan45
 
Cloud Security Governance
BIJ MISHRA
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Unisys Corporation
 
Cloud computing security
gangal
 
IntelAdapt
Maggie Albrecht
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
CCSK Certificate of Cloud Computing Knowledge - overview
Peter HJ van Eijk
 
Turtles, Trust and The Future of Cybersecurity
Digital Transformation EXPO Event Series
 
Secure the modern Enterprise
Microsoft Österreich
 
3 rd International Conference on Cloud, Big Data and Web Services (CBW 2022)
ijait
 
Five cloud security tips
ServiceMesh
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
ITpreneurs
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
IJRES Journal
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
Security on distributed systems cloud security versus traditional it
ieeepondy
 
Manage Risk By Protecting the Apps and Data Infographic
Citrix
 
Ad

Similar to Security and Privacy Challenges in Cloud Computing Environments (20)

PPTX
Top Trends in Cloud Computing for 2023.pptx
SaadZaman23
 
PDF
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
PPT
Cloud Computing & Security Concerns
University of San Francisco
 
PDF
Strategies for assessing cloud security
Arun Gopinath
 
PDF
Strategies for assessing cloud security
IBM India Smarter Computing
 
PDF
Ast 0064255 strategies-for_assessing_cloud_security
Accenture
 
PDF
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
 
PDF
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 
PDF
Ad4502189193
IJERA Editor
 
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
PPTX
Cloud is not an option, but is security?
Jody Keyser
 
PPT
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
PPTX
Cloud Computing Security Essentials for beginners
ssuser1e89a0
 
PDF
1376843836 94879193
Editor Jacotech
 
PDF
1376843836 94879193
Editor Jacotech
 
PDF
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
DOCX
Cloud computing risk assesment report
Ahmad El Tawil
 
PDF
J3602068071
ijceronline
 
PDF
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
Glenn Ambler
 
Top Trends in Cloud Computing for 2023.pptx
SaadZaman23
 
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
Cloud Computing & Security Concerns
University of San Francisco
 
Strategies for assessing cloud security
Arun Gopinath
 
Strategies for assessing cloud security
IBM India Smarter Computing
 
Ast 0064255 strategies-for_assessing_cloud_security
Accenture
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 
Ad4502189193
IJERA Editor
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Cloud is not an option, but is security?
Jody Keyser
 
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Cloud Computing Security Essentials for beginners
ssuser1e89a0
 
1376843836 94879193
Editor Jacotech
 
1376843836 94879193
Editor Jacotech
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
Cloud computing risk assesment report
Ahmad El Tawil
 
J3602068071
ijceronline
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
Glenn Ambler
 
Ad

More from Eyob Seyfu (17)

PDF
Chapter Five - Relational Query Languages.pdf
Eyob Seyfu
 
PDF
Chapter Three - Entity Relationship Diagram (ERD).pdf
Eyob Seyfu
 
PDF
Chapter Two: Database System Concepts and Architectures
Eyob Seyfu
 
PDF
Chapter One: Introduction to Database Systems
Eyob Seyfu
 
PDF
Lec 9 conclusion
Eyob Seyfu
 
PDF
Lec 8 ai implementation
Eyob Seyfu
 
PDF
Lec 7 genetic algorithms
Eyob Seyfu
 
PDF
Lec 6 learning
Eyob Seyfu
 
PDF
Lec 5 uncertainty
Eyob Seyfu
 
PDF
Lec 4 expert systems
Eyob Seyfu
 
PDF
Lec 3 1 reasoning
Eyob Seyfu
 
PDF
Lec 3 knowledge acquisition representation and inference
Eyob Seyfu
 
PDF
Lec 2 1 informed search
Eyob Seyfu
 
PDF
Lec 2 agents
Eyob Seyfu
 
PDF
Lec 0 about the course
Eyob Seyfu
 
PDF
Lec 1 introduction
Eyob Seyfu
 
PPTX
A Survey on Wireless Mesh Networks (WMN)
Eyob Seyfu
 
Chapter Five - Relational Query Languages.pdf
Eyob Seyfu
 
Chapter Three - Entity Relationship Diagram (ERD).pdf
Eyob Seyfu
 
Chapter Two: Database System Concepts and Architectures
Eyob Seyfu
 
Chapter One: Introduction to Database Systems
Eyob Seyfu
 
Lec 9 conclusion
Eyob Seyfu
 
Lec 8 ai implementation
Eyob Seyfu
 
Lec 7 genetic algorithms
Eyob Seyfu
 
Lec 6 learning
Eyob Seyfu
 
Lec 5 uncertainty
Eyob Seyfu
 
Lec 4 expert systems
Eyob Seyfu
 
Lec 3 1 reasoning
Eyob Seyfu
 
Lec 3 knowledge acquisition representation and inference
Eyob Seyfu
 
Lec 2 1 informed search
Eyob Seyfu
 
Lec 2 agents
Eyob Seyfu
 
Lec 0 about the course
Eyob Seyfu
 
Lec 1 introduction
Eyob Seyfu
 
A Survey on Wireless Mesh Networks (WMN)
Eyob Seyfu
 

Recently uploaded (20)

PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Software Development Methodologies in 2025
KodekX
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 

Security and Privacy Challenges in Cloud Computing Environments

  • 2. Security and Privacy Challenges in Cloud Computing Environments Presentation By: Mr. Eyob Sisay (RM0231/10), School of Electrical and Computer Engineering, Jimma Institute of Technology, Jimma University, Ethiopia W e l c o m e !
  • 3. Discussion Points:  Introduction  Unique Security and Privacy Implications  Security and Privacy Challenges  Security and Privacy Approaches  Conclusions 8/16/2018Eyob S.
  • 4. I n t r o d u c t i o n  Cloud computing could significantly enhance collaboration, agility, and scale, thus enabling global computing model.  Five Key Characteristics: 1. On demand self-service 2. Ubiquitous network access 3. Location independent resource pooling 4. Rapid elasticity 5. Measured service - automated resource allocation, load balancing, and metering tools. 18/16/2018Eyob S.
  • 5. 2 Cont.. 8/16/2018Eyob S.  The three key cloud delivery models: 1. Software as a Service (SaaS)  application software as on-demand services 2. Platform as a Service (PaaS)  programming environments 3. Infrastructure as a Service (IaaS)  virtualized infrastructural components: VMs, storages  Four Cloud deployment models:  public, private, community, and  hybrid clouds.
  • 6. Unique Security and Privacy Implications in Cloud Computing  Outsourcing Data and Applications  only authorized entities can gain access  Clients need to have significant trust in their provider’s technical competence and economic stability.  Extensibility and Shared Responsibility  The sharing levels will differ for different delivery models  Issues: access policies, application deployment, and data access and protection to provide a secure, multi-tenant environment. 38/16/2018Eyob S.
  • 7. 4 Cont.. 8/16/2018Eyob S.  Service-Level Agreements  The on-demand service or utility-based economic model, dynamicity  to build a new layer to support a contract negotiation phase between service providers and consumers, to monitor contract enforcement.  Virtualization and Hypervisors  abstract infrastructure and resources exist to clients as isolated VMs.  multiple operating systems run on a host computer concurrently  Heterogeneity  a potential issue with vertical heterogeneity and multi-tenant env’t,  Compliance and Regulations  cloud services accessible from anywhere and at anytime.
  • 8. Security and Privacy Challenges  Authentication and Identity Management  Existing password-based authentication has an inherited limitation  multi-jurisdiction, and providers must segregate customer identity  Access Control and Accounting  The access control models must capture relevant aspects of SLAs.  The utility model of clouds demands proper accounting of user and service activities. The outsourcing and multi-tenancy aspects of clouds could accelerate customers’ fears about accounting logs. 58/16/2018Eyob S.
  • 9. 6 Cont.. 8/16/2018Eyob S.  Trust Management and Policy Integration  mechanisms are necessary to ensure that a dynamic collaboration is handled securely and that security breaches are effectively monitored during the interoperation process.  Secure-Service Management  the traditional WSDL can’t fully meet the requirements of cloud computing services description.  Privacy and Data Protection  Many organizations aren’t comfortable storing their data and applications on systems that reside outside of their datacenters.  Organizational Security Management  Existing security mgn’t and information security life-cycle models significantly change when enterprises adopt cloud computing.
  • 10. Security and Privacy Approaches  Authentication and Identity Management  Access Control Needs  Secure Interoperation  Secure-Service Provisioning and Composition  Trust Management Framework  Data-Centric Security and Privacy  Managing Semantic Heterogeneity 78/16/2018Eyob S.
  • 11. 8 Cont.. 8/16/2018Eyob S.  Authentication and Identity Management  mechanisms are necessary to ensure that a dynamic collaboration is handled securely and that security breaches are effectively monitored during the interoperation process.  Access Control Needs  the traditional WSDL can’t fully meet the requirements of cloud computing services description.  Secure Interoperation  Many organizations aren’t comfortable storing their data and applications on systems that reside outside of their datacenters.  Organizational Security Management  Existing security mgn’t and information security life-cycle models significantly change when enterprises adopt cloud computing.
  • 12. 9 Cont.. 8/16/2018Eyob S.  Trust Management and Policy Integration  mechanisms are necessary to ensure that a dynamic collaboration is handled securely and that security breaches are effectively monitored during the interoperation process.  Trust Management Framework  the traditional WSDL can’t fully meet the requirements of cloud computing services description.  Data-Centric Security and Privacy  Many organizations aren’t comfortable storing their data and applications on systems that reside outside of their datacenters.  Managing Semantic Heterogeneity  Existing security mgnt and information security life-cycle models significantly change when enterprises adopt cloud computing.
  • 13. C o n c l u s i o n  The existing security and privacy solutions must be critically reevaluated with regard to their appropriateness for clouds.  Many enhancements in existing solutions and newer solutions are urgently needed to ensure that cloud computing benefits are fully realized as its adoption accelerates.  Cloud computing is still in its infancy, and changes in security and privacy landscape will impact its successful, widespread adoption. 8/16/2018Eyob S. 10
  • 14. Source: 8/16/2018Eyob S. • Hassan Takabi and James Joshi • partially supported by US National Science Foundation grants NSF-IIS-0545912 and NSF-CCF-0720737. • Gail-Joon Ahn • partially supported by US National Science Foundation grants (NSF-IIS-0900970 and NSFCNS-0831360), and • Department of Energy grants (DESC0004308 and DE- FG02-03ER25565

Editor's Notes

  • #5: cloud service providers control and optimize the use of computing resources through automated resource allocation, load balancing, and metering tools.
  • #7: Outsourcing Data and Applications only authorized entities can gain access to the data. Clients need to have significant trust in their provider’s technical competence and economic stability. Multi-tenancy - allows cloud providers to manage resource utilization by partitioning a virtualized, shared infrastructure among various customers.
  • #8: It records a common understanding about services, priorities, responsibilities, guarantees, and warranties.
  • #10: - trust framework and maintain trust to adaptively support policy integration. - many cloud service providers use the Web Services Description Language(WSDL)