I. INTRODUCTION
The cloud computing model represents a new paradigm shift
in internet-based services that delivers highly scalable
distributed computing platforms in which computational
resources are offered 'as a service'. Although the cloud
model is designed to reap uncountable benefits for all cloud
stakeholders including cloud providers (CPs), cloud
consumers (CCs), and service providers (SPs), the model
still has a number of open issues that impact its credibility.
Security is considered one of the top ranked open issues in
adopting the cloud computing model, as reported by IDC
[1]. A reasonable justification of such increasing concerns
of the CCs about cloud security [2] includes: (1) The loss of
control over cloud hosted assets (CCs become not able to
maintain their Security Management Process (SMP) on the
cloud hosted IT assets); (2) The lack of security guarantees
in the SLAs between the CPs and CCs; and (3) the sharing
of resources with competitors or malicious users.
Accordingly, no matter how strongly the model is secured,
consumers continue suffering from the loss of control and
lack of trust problems. On the other hand, the CPs struggle
with the cloud platform security issues because the cloud
model is very complex and has a lot of dimensions that must
be considered when developing a holistic security model [2
I. INTRODUCTION
The cloud computing model represents a new paradigm shift
in internet-based services that delivers highly scalable
distributed computing platforms in which computational
resources are offered 'as a service'. Although the cloud
model is designed to reap uncountable benefits for all cloud
stakeholders including cloud providers (CPs), cloud
consumers (CCs), and service providers (SPs), the model
still has a number of open issues that impact its credibility.
Security is considered one of the top ranked open issues in
adopting the cloud computing model, as reported by IDC
[1]. A reasonable justification of such increasing concerns
of the CCs about cloud security [2] includes: (1) The loss of
control over cloud hosted assets (CCs become not able to
maintain their Security Management Process (SMP) on the
cloud hosted IT assets); (2) The lack of security guarantees
in the SLAs between the CPs and CCs; and (3) the sharing
of resources with competitors or malicious users.
Accordingly, no matter how strongly the model is secured,
consumers continue suffering from the loss of control and
lack of trust problems. On the other hand, the CPs struggle
with the cloud platform security issues because the cloud
model is very complex and has a lot of dimensions that must
be considered when developing a holistic security model [2
การแปล กรุณารอสักครู่..