An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Cloud Hooks: Security and Privacy Issues in Cloud Computing
Published
Author(s)
Wayne Jansen
Abstract
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses.
Proceedings Title
Proceedings of the 44th Annual Hawaii International Conference on System Sciences
Conference Dates
January 4-7, 2011
Conference Location
Koloa, HI
Conference Title
HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES
Jansen, W.
(2011),
Cloud Hooks: Security and Privacy Issues in Cloud Computing, Proceedings of the 44th Annual Hawaii International Conference on System Sciences, Koloa, HI, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906716
(Accessed December 10, 2024)