Authors: Wolf Michael Halton; Syed Rahman
Addresses: Atlanta Clout Technology, Inc., 302 N Colonial Homes Cir. NW, Atlanta, GA 30309, USA. ' Department of Computer Science and Engineering, University of Hawaii-Hilo, 200 W. Kawili Street, Hilo, HI 96720, USA
Abstract: Next-generation networking is moving out of the LAN and adopting cloud computing increasingly. Virtual machines and clouds mask the hardware infrastructure from the LAN administrator as well. Cloud architecture will be ubiquitous and in the future clouds will drop the unnecessary distinction of platform as a service, leaving a slightly larger infrastructure as a service (IaaS) level and an application level (SaaS). Provisioning costs will get lower but the costs of data breaches will continue to climb. This paper explores the security ramifications of cloud-adoption by reviewing the literature and presenting a collection of best-practices for security in the cloud.
Keywords: next generation networks; cloud adopters; best practices; cloud computing; open source; cloud security.
International Journal of Communication Networks and Distributed Systems, 2012 Vol.8 No.1/2, pp.70 - 84
Received: 08 May 2021
Accepted: 12 May 2021
Published online: 17 Dec 2011 *