Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cloud Hooks: Security and Privacy Issues in Cloud Computing

Published

Author(s)

Wayne Jansen

Abstract

In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses.
Proceedings Title
Proceedings of the 44th Annual Hawaii International Conference on System Sciences
Conference Dates
January 4-7, 2011
Conference Location
Koloa, HI
Conference Title
HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES

Keywords

Cloud Computing, Computer Security, Privacy

Citation

Jansen, W. (2011), Cloud Hooks: Security and Privacy Issues in Cloud Computing, Proceedings of the 44th Annual Hawaii International Conference on System Sciences, Koloa, HI, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906716 (Accessed July 20, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created January 4, 2011, Updated February 19, 2017