• DocumentCode
    599414
  • Title

    Cloud security: Can the cloud be secured?

  • Author

    Karnad, K. ; Nagenthram, Saravanan

  • Author_Institution
    Product Quality & Reliability Eng., MIMOS Berhad, Kuala Lumpur, Malaysia
  • fYear
    2012
  • fDate
    10-12 Dec. 2012
  • Firstpage
    208
  • Lastpage
    210
  • Abstract
    Techniques used for attacking the legacy web applications are still valid on the cloud, but the legacy security methods are no longer valid. Welcome to the new world! Cloud computing is ubiquitous with ease of use, zero hardware issues, pay as you grow and other trendy terminologies. It is also perceived as being more secure on cloud. Does that mean there is no need for any penetration testing for cloud-based applications? If needed, what should be those set of tests, and which tools are best suited to perform these? How different is cloud security testing from the legacy three-tier architecture testing? It is a known fact that companies invest less when it comes to security. So what alternatives are we left with? These, among other questions are answered during the course of this white paper.
  • Keywords
    cloud computing; security of data; software maintenance; Cloud computing; Web applications; cloud based applications; cloud security; legacy security methods; Communication system security; Computational modeling; Encryption; Scalability; Wireless communication; XML; Backtrack; Metasploit; Pen Testing; mobile; open source tools for security testing; security on cloud; wireless;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology And Secured Transactions, 2012 International Conference for
  • Conference_Location
    London
  • Print_ISBN
    978-1-4673-5325-0
  • Type

    conf

  • Filename
    6470944