ABSTRACT

This chapter discusses how to secure cloud computing. It presents cloud security, cloud privacy and trust management. Control of security in cloud computing is not fundamentally different from security control in any Information Technology (IT) environment. Cloud providers respond to these concerns by arguing that their security measures and processes are more mature and tested than those of the average company. Security of cloud computing can be viewed through numerous views. One view is the perspective of stakeholders. Each of the stakeholders has their own security interest and aims. Content security approaches evolved before the concepts of virtualization and cloud computing, and were not designed for use in cloud environments. The outsourcing of key services to the cloud may require customer organizations to seek new and more mature approaches to risk management and accountability. Cloud computing trust is more complex than in a traditional IT scenario where the information owner manages their own computers.