(In)Security above the Clouds

Autores
Echaiz, Javier; Ardenghi, Jorge Raúl
Año de publicación
2010
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
In an ideal world, organizations “share” the cloud, logically separated from each other by the cloud provider, operating independently of each other in a sandbox, pulling resources only when needed, and respecting the separation put in place by the cloud provider. In the real world, applications uploaded to the cloud are trying to break out of their sandbox, attempting to gain access to other applications and hardware and trying to consume resources. The attackers know they have complete control of what the cloud runs; they know cloud security is immature and developing. Cloud computing creates new security problems that must be dealt with in addition to the existing problems. This research line explores these security problems.
Eje: Procesamiento distribuido y paralelo
Red de Universidades con Carreras en Informática (RedUNCI)
Materia
Ciencias Informáticas
Parallel
cloud computing
security
Parallel processing
SaaS
PaaS
IaaS
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/19589

id SEDICI_3bc3eb248f4c0cd822f299bcf408f0d7
oai_identifier_str oai:sedici.unlp.edu.ar:10915/19589
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling (In)Security above the CloudsEchaiz, JavierArdenghi, Jorge RaúlCiencias InformáticasParallelcloud computingsecurityParallel processingSaaSPaaSIaaSIn an ideal world, organizations “share” the cloud, logically separated from each other by the cloud provider, operating independently of each other in a sandbox, pulling resources only when needed, and respecting the separation put in place by the cloud provider. In the real world, applications uploaded to the cloud are trying to break out of their sandbox, attempting to gain access to other applications and hardware and trying to consume resources. The attackers know they have complete control of what the cloud runs; they know cloud security is immature and developing. Cloud computing creates new security problems that must be dealt with in addition to the existing problems. This research line explores these security problems.Eje: Procesamiento distribuido y paraleloRed de Universidades con Carreras en Informática (RedUNCI)2010-05info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf596-600http://sedici.unlp.edu.ar/handle/10915/19589enginfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/2.5/ar/Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-03T10:26:50Zoai:sedici.unlp.edu.ar:10915/19589Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-03 10:26:50.262SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv (In)Security above the Clouds
title (In)Security above the Clouds
spellingShingle (In)Security above the Clouds
Echaiz, Javier
Ciencias Informáticas
Parallel
cloud computing
security
Parallel processing
SaaS
PaaS
IaaS
title_short (In)Security above the Clouds
title_full (In)Security above the Clouds
title_fullStr (In)Security above the Clouds
title_full_unstemmed (In)Security above the Clouds
title_sort (In)Security above the Clouds
dc.creator.none.fl_str_mv Echaiz, Javier
Ardenghi, Jorge Raúl
author Echaiz, Javier
author_facet Echaiz, Javier
Ardenghi, Jorge Raúl
author_role author
author2 Ardenghi, Jorge Raúl
author2_role author
dc.subject.none.fl_str_mv Ciencias Informáticas
Parallel
cloud computing
security
Parallel processing
SaaS
PaaS
IaaS
topic Ciencias Informáticas
Parallel
cloud computing
security
Parallel processing
SaaS
PaaS
IaaS
dc.description.none.fl_txt_mv In an ideal world, organizations “share” the cloud, logically separated from each other by the cloud provider, operating independently of each other in a sandbox, pulling resources only when needed, and respecting the separation put in place by the cloud provider. In the real world, applications uploaded to the cloud are trying to break out of their sandbox, attempting to gain access to other applications and hardware and trying to consume resources. The attackers know they have complete control of what the cloud runs; they know cloud security is immature and developing. Cloud computing creates new security problems that must be dealt with in addition to the existing problems. This research line explores these security problems.
Eje: Procesamiento distribuido y paralelo
Red de Universidades con Carreras en Informática (RedUNCI)
description In an ideal world, organizations “share” the cloud, logically separated from each other by the cloud provider, operating independently of each other in a sandbox, pulling resources only when needed, and respecting the separation put in place by the cloud provider. In the real world, applications uploaded to the cloud are trying to break out of their sandbox, attempting to gain access to other applications and hardware and trying to consume resources. The attackers know they have complete control of what the cloud runs; they know cloud security is immature and developing. Cloud computing creates new security problems that must be dealt with in addition to the existing problems. This research line explores these security problems.
publishDate 2010
dc.date.none.fl_str_mv 2010-05
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/19589
url http://sedici.unlp.edu.ar/handle/10915/19589
dc.language.none.fl_str_mv eng
language eng
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
dc.format.none.fl_str_mv application/pdf
596-600
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1842260101563416576
score 13.13397