Loading…

Cloud Security: A Gathering Storm

Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.

Saved in:
Bibliographic Details
Published in:Communications of the ACM 2014-05, Vol.57 (5), p.70-79
Main Authors: NANAVATI, Mihir, COLP, Patrick, AIELLO, Bill, WARFIELD, Andrew
Format: Magazinearticle
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63
container_end_page 79
container_issue 5
container_start_page 70
container_title Communications of the ACM
container_volume 57
creator NANAVATI, Mihir
COLP, Patrick
AIELLO, Bill
WARFIELD, Andrew
description Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.
doi_str_mv 10.1145/2593686
format magazinearticle
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1534533599</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3330638621</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63</originalsourceid><addsrcrecordid>eNo9j01LxDAURYMoWEfxL1REXFXz0Zcm7oaiozDgYnQd0jTRDp12TNLF_HsjU1xdHhzOuxeha4IfCCnhkYJkXPATlBGAqqgYqU5RhjEmBa4EPUcXIWzTiYFDhm7qfpzafGPN5Lt4eMqX-UrHb-u74SvfxNHvLtGZ032wV3Mu0OfL80f9WqzfV2_1cl0YWkIsqLQS64YJY0tgRmBGpRZOcNYKLixzLbQESEkboXnJLDTANceEu0pDazlboNujd-_Hn8mGqLbj5If0UhFgyclAykTdHynjxxC8dWrvu532B0Ww-tuv5v2JvJt9OhjdO68H04V_nAoAilOTXw4eVe0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>1534533599</pqid></control><display><type>magazinearticle</type><title>Cloud Security: A Gathering Storm</title><source>EBSCOhost Business Source Ultimate</source><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>NANAVATI, Mihir ; COLP, Patrick ; AIELLO, Bill ; WARFIELD, Andrew</creator><creatorcontrib>NANAVATI, Mihir ; COLP, Patrick ; AIELLO, Bill ; WARFIELD, Andrew</creatorcontrib><description>Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.</description><identifier>ISSN: 0001-0782</identifier><identifier>EISSN: 1557-7317</identifier><identifier>DOI: 10.1145/2593686</identifier><identifier>CODEN: CACMA2</identifier><language>eng</language><publisher>New York, NY: Association for Computing Machinery</publisher><subject>Applied sciences ; Cloud computing ; Computer science; control theory; systems ; Data integrity ; Economies of scale ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Software ; Virtualization</subject><ispartof>Communications of the ACM, 2014-05, Vol.57 (5), p.70-79</ispartof><rights>2015 INIST-CNRS</rights><rights>Copyright Association for Computing Machinery May 2014</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780,27904</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=28552064$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>NANAVATI, Mihir</creatorcontrib><creatorcontrib>COLP, Patrick</creatorcontrib><creatorcontrib>AIELLO, Bill</creatorcontrib><creatorcontrib>WARFIELD, Andrew</creatorcontrib><title>Cloud Security: A Gathering Storm</title><title>Communications of the ACM</title><description>Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.</description><subject>Applied sciences</subject><subject>Cloud computing</subject><subject>Computer science; control theory; systems</subject><subject>Data integrity</subject><subject>Economies of scale</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Software</subject><subject>Virtualization</subject><issn>0001-0782</issn><issn>1557-7317</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2014</creationdate><recordtype>magazinearticle</recordtype><recordid>eNo9j01LxDAURYMoWEfxL1REXFXz0Zcm7oaiozDgYnQd0jTRDp12TNLF_HsjU1xdHhzOuxeha4IfCCnhkYJkXPATlBGAqqgYqU5RhjEmBa4EPUcXIWzTiYFDhm7qfpzafGPN5Lt4eMqX-UrHb-u74SvfxNHvLtGZ032wV3Mu0OfL80f9WqzfV2_1cl0YWkIsqLQS64YJY0tgRmBGpRZOcNYKLixzLbQESEkboXnJLDTANceEu0pDazlboNujd-_Hn8mGqLbj5If0UhFgyclAykTdHynjxxC8dWrvu532B0Ww-tuv5v2JvJt9OhjdO68H04V_nAoAilOTXw4eVe0</recordid><startdate>20140501</startdate><enddate>20140501</enddate><creator>NANAVATI, Mihir</creator><creator>COLP, Patrick</creator><creator>AIELLO, Bill</creator><creator>WARFIELD, Andrew</creator><general>Association for Computing Machinery</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope></search><sort><creationdate>20140501</creationdate><title>Cloud Security: A Gathering Storm</title><author>NANAVATI, Mihir ; COLP, Patrick ; AIELLO, Bill ; WARFIELD, Andrew</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Applied sciences</topic><topic>Cloud computing</topic><topic>Computer science; control theory; systems</topic><topic>Data integrity</topic><topic>Economies of scale</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Software</topic><topic>Virtualization</topic><toplevel>online_resources</toplevel><creatorcontrib>NANAVATI, Mihir</creatorcontrib><creatorcontrib>COLP, Patrick</creatorcontrib><creatorcontrib>AIELLO, Bill</creatorcontrib><creatorcontrib>WARFIELD, Andrew</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>Communications of the ACM</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>NANAVATI, Mihir</au><au>COLP, Patrick</au><au>AIELLO, Bill</au><au>WARFIELD, Andrew</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud Security: A Gathering Storm</atitle><jtitle>Communications of the ACM</jtitle><date>2014-05-01</date><risdate>2014</risdate><volume>57</volume><issue>5</issue><spage>70</spage><epage>79</epage><pages>70-79</pages><issn>0001-0782</issn><eissn>1557-7317</eissn><coden>CACMA2</coden><abstract>Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.</abstract><cop>New York, NY</cop><pub>Association for Computing Machinery</pub><doi>10.1145/2593686</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0001-0782
ispartof Communications of the ACM, 2014-05, Vol.57 (5), p.70-79
issn 0001-0782
1557-7317
language eng
recordid cdi_proquest_journals_1534533599
source EBSCOhost Business Source Ultimate; Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)
subjects Applied sciences
Cloud computing
Computer science
control theory
systems
Data integrity
Economies of scale
Exact sciences and technology
Memory and file management (including protection and security)
Memory organisation. Data processing
Software
Virtualization
title Cloud Security: A Gathering Storm
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T16%3A51%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud%20Security:%20A%20Gathering%20Storm&rft.jtitle=Communications%20of%20the%20ACM&rft.au=NANAVATI,%20Mihir&rft.date=2014-05-01&rft.volume=57&rft.issue=5&rft.spage=70&rft.epage=79&rft.pages=70-79&rft.issn=0001-0782&rft.eissn=1557-7317&rft.coden=CACMA2&rft_id=info:doi/10.1145/2593686&rft_dat=%3Cproquest_cross%3E3330638621%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c245t-29e90ab38ce453c80329a8f863d868e3fd5d15142b8a643e5b56a6016f7a5de63%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1534533599&rft_id=info:pmid/&rfr_iscdi=true