References
[1]. Cloud Security Alliance, (2010). Top Threats to Cloud
Computing V1.0.
[2]. Jon Brodkin, (2008). Gartner: Seven Cloud-
Computing Security Risks. Infoword.
[3]. Dimitrios Zissis, and Dimitrios Lekkas, (2011).
“Addressing cloud computing security issues”. Future
Generation Computer Systems, Vol. 28, No. 3, pp. 583-
592.
[4]. S. Subashini, and V. Kavitha, (2011). “A Survey on
security issues in service delivery models of cloud
computing”. Journal of Network and Computer
Applications, Vol. 34, No. 1, pp. 1-11.
[5]. Wayne A. Jansen, (2011). “Cloud Hooks: Security and
privacy issues in cloud computing”. Proceedings of the
44th Hawaii International Conference on System
Sciences, pp. 1-10.
[6]. David Teneyuca, (2011). “Internet cloud security: The
illusion of inclusion”. Information Security Technical
Report, Vol. 16, No. 3-4, pp. 102-107.
[7]. Afkham Azeez, Srinath Perera, Dimuthu Gamage,
Ruwan Linton, Prabath Siriwardana, Dimuthu Leelaratne,
Sanjiva Weerawarana, and Paul Fremantle, (2010).
“Multi-Tenant SOA middleware for cloud computing”. IEEE
3rd International Conference on Cloud Computing, pp.
458-465.
[8]. Verizon RISK Team, (2012). Data Breach Investigations
Report (DBIR).
[9]. Prasad Saripalli, and Ben Walters, (2010). “QUIRC: A
quantitative impactand risk assessment framework for
cloud security”. IEEE 3rd International Conference on
Cloud Computing.
[10]. Hagai Bar-El, (n.d.). Introduction to Side Channel
Attacks. Discretix technologies Ltd.
[11]. S. Pearson and A. Benameur, (2010). “Privacy,
Security and Trust Issues Arising from Cloud Computing”.
IEEE Second International Conference on Cloud
Computing Technology and Science, Vol. 8, No. 6, pp.
692–702.
[12]. Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu, and Mukesh
Singhal, (2010). “Information flow control in cloud
computing”. IEEE Transactions on Network and Service
management, Vol. 11, No. 1, pp. 76-89.
[13]. D. Milojicic, (2000). “Security and Privacy”. IEEE
Concurrency, Vol. 8, No. 2, pp. 24–21.
[14]. Augusto Ciuffoletti, (2010). “Monitoring a virtual
network infrastructure: An Iaas Perspective”. ACM
SIGCOMM Computer communication Review, Vol. 40,
No. 5, pp. 47-52.
[15]. Z. Chen and J. Yoon, (2010). “IT Auditing to Assure a
Secure Cloud Computing”. 6th World Congress on
Services, pp. 252– 259.
[16]. S. Bleikertz, M. Schunter, C.W. Probst, and K. Eriksson,
(2010). “Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds Categories and Subject
Descriptors”. CCSW’10, pp. 92–102.
[17]. R. Chakraborty, S. Ramireddy, T.S. Raghu, and H.R.
Rao, (2010). “The Information Assurance Practices of
Cloud Computing”. IT Professional, Vol. 12, No. 4, pp.
29–37.
[18]. R. Grandl, Y. Chen, J. Khalid, S. Yang, A. Anand, T.
Benson, and A. Akella, (2013). “Harmony: Coordinating
network, compute, and storage in software-defined
clouds”. In Proceedings of the 4th Annual Symposium on
Cloud Computing.
[19]. S.A. Baset, L. Wang, B.C. Tak, C. Pham, and C. Tang,
(2014). “Toward achieving operational excellence in a
cloud”. IBM Journal of Research and Development, Vol.
58, No. 2/3.
[20]. H. Alaqrabi, Lu Liu, Jie Xu, Richard Hill, Nick
Antono poulos,and ongzhao Zhan,(2012) .
“Investigation of IT security and compliance challenges in
security-as-a-Service for cloud computing”. 15th IEEE
International Symposium on Object/Component/
Service-Oriented Real-Time Distributed Computing
Workshops (ISORCW).
[21]. Eric Keller, Jakub Szefer, Jennifer Rexford, and Ruby
B. Lee, (2010). “NoHype: virtualized cloud infrastructure
without the virtualization”. The 27th Annual International
Symposium on Computer Architecture.
[22]. Francisco Rocha, Thomas Gross, and Aad van
Moorsel, (2012). “Defense in-depth Against Malicious
Insiders in the Cloud”. IEEE International Conference on
Cloud Engineering.
[23]. Peng Li, Debin Gao, and Michael K. Reiter, (2012).
“Mitigating Access-Driven Timing Channels in Clouds
using StopWatch”. The 42nd Annual IEEE/IFIP International
Conference on Dependable Systems and Networks.