Cloud Computing for Optimization: Foundations, Applications, and Challenges by Bhabani Shankar Prasad Mishra Himansu Das Satchidananda Dehuri & Alok Kumar Jagadev

Cloud Computing for Optimization: Foundations, Applications, and Challenges by Bhabani Shankar Prasad Mishra Himansu Das Satchidananda Dehuri & Alok Kumar Jagadev

Author:Bhabani Shankar Prasad Mishra, Himansu Das, Satchidananda Dehuri & Alok Kumar Jagadev
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham


10.2 Cloud Computing Security Objectives, Challenges

Security and Privacy has always been an essential factor in discussion related to computing. Security has always been regarded as one of non-functional requirements of a system such as reliability, maintainability etc. making it hard to measure. Providing too much security to applications may adversely affect quality of service parameters like response time, cost etc. However, providing less security may lead to security breaches of the cloud services which affect the reputation and mean time to recovery. Hence, planning smartly and providing an optimized security plays a great role in enabling the cloud applications to successfully function as designed and meet all the desired quality of service metrics. In this section, we discuss about such objective and challenges. Also Security Policy Implementation and challenges in virtual security management using VMWare ESX server case study as dealt with in the section.

Consider a scenario where a company is considering to move their products and information to cloud. Then, security of the organizations critical information in a cloud environment maintained by cloud service provider is of principal concern. Especially, when the data is being kept in geographically distributed cloud environments which are not under direct control of the company. In order to provide confidence to the companies and developers, the cloud service providers adhere to strict set of security requirement and objectives. This section [3] talks about such requirements, design constraints of secure cloud systems. We also cover topics related to challenges in policy implementation as well as go over case study of Virtualization security management using VMWare ESX server as example.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.