Title: The top ten cloud-security practices in next-generation networking

Authors: Wolf Michael Halton; Syed Rahman

Addresses: Atlanta Clout Technology, Inc., 302 N Colonial Homes Cir. NW, Atlanta, GA 30309, USA. ' Department of Computer Science and Engineering, University of Hawaii-Hilo, 200 W. Kawili Street, Hilo, HI 96720, USA

Abstract: Next-generation networking is moving out of the LAN and adopting cloud computing increasingly. Virtual machines and clouds mask the hardware infrastructure from the LAN administrator as well. Cloud architecture will be ubiquitous and in the future clouds will drop the unnecessary distinction of platform as a service, leaving a slightly larger infrastructure as a service (IaaS) level and an application level (SaaS). Provisioning costs will get lower but the costs of data breaches will continue to climb. This paper explores the security ramifications of cloud-adoption by reviewing the literature and presenting a collection of best-practices for security in the cloud.

Keywords: next generation networks; cloud adopters; best practices; cloud computing; open source; cloud security.

DOI: 10.1504/IJCNDS.2012.044323

International Journal of Communication Networks and Distributed Systems, 2012 Vol.8 No.1/2, pp.70 - 84

Published online: 30 Aug 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article