Cloud Computing and Cyber security
In your summary, you should describe in your own words the article’s main points. Because this is a summary of an article and not a review or critique, your grade will mainly depend on how well you demonstrate that you understand the important points that the authors make in the article.
Because the article to be summarized is already cited in the assignment, you do not have to include a reference to that article in your summary. However, any other articles or outside references must be cited.
The contents of your summary must be at least three full pages in length, but not more than five pages. A title page, a list of references or other components that are not part of your summary will not be included in the page count. You should use a font that isno more than 12 points in size, single spacing and a maximum of 1″ margins. You must submit either a Word document or a PDF document.
The answers to these questions should be clearly marked in a separate section from your summary so that they can be found without reading the summary.
- 1. The authors address five security concerns: confidentiality, integrity, availability, accountability and privacy. Some of these concerns can be handled by encryption, but the authors do not include cryptography as a defense for accountability. Describe two of the techniques that the authors suggest to provide accountabilityin cloud computing.
- 2. The authors discuss several techniques that can be used to defend against attacks on confidentiality. Describe two of the techniques that the authors suggest to protect against cross-VM attacks.
- In your own words,describe the two open issues in cloud privacy that the authors discuss.