{"title":"What's different about security in a public cloud?","authors":"C. Kaufman","doi":"10.1145/2046660.2046668","DOIUrl":null,"url":null,"abstract":"Most of the problems facing the designers of a public cloud are extensions of what we face in any data center: detecting and preventing intrusions, coping with DoS attacks, and keeping the various services largely isolated from one another. There are some new challenges: how to control the behavior of customers when your privacy guarantees prevent you from looking too closely at what they are doing, how to protect them from network based attacks when you don't know what kind of traffic is normal, and how to guarantee them resources when the behavior of others sharing the hardware is unpredictable. There are also some new advantages: centrally managing software maintenance can assure that patches are installed promptly, and scale permits a permanent staff of experienced trouble shooters to handle what would be rare problems for any individual customer.","PeriodicalId":300613,"journal":{"name":"Cloud Computing Security Workshop","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cloud Computing Security Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2046660.2046668","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Most of the problems facing the designers of a public cloud are extensions of what we face in any data center: detecting and preventing intrusions, coping with DoS attacks, and keeping the various services largely isolated from one another. There are some new challenges: how to control the behavior of customers when your privacy guarantees prevent you from looking too closely at what they are doing, how to protect them from network based attacks when you don't know what kind of traffic is normal, and how to guarantee them resources when the behavior of others sharing the hardware is unpredictable. There are also some new advantages: centrally managing software maintenance can assure that patches are installed promptly, and scale permits a permanent staff of experienced trouble shooters to handle what would be rare problems for any individual customer.