Software Development for a Cloud Computing: IaaS, PaaS, SaaS, DaaS, AWS, Azure, Cloud Foundry, Heroku
 
Tag: <span>cloud security</span>

Kubernetes Runtime Security

The Kubernetes open source cluster management system provides the mechanisms through which you interact with your cluster. You use Kubernetes commands and resources to deploy and manage your applications, perform administration tasks and set policies, and monitor the health of your deployed workloads. When you run a Kubernetes Engine cluster, …

Virtualization Security in Cloud Computing

Bringing VMs (virtual machines) onto the cloud has become increasingly popular. Recent years have seen great advancements in both cloud computing and virtualization. On one hand there is the ability to pool various resources to provide software-as-a-service, infrastructure-as-a-service and platform-as-a-service. At its most basic, this is what describes cloud computing. …

Cloud Survey Find Need for Better Security and Performance Monitoring

AccelOps announced findings from its recent survey of 176 IT security professionals conducted online and at the RSA Conference 2013. While 65 percent of respondents’ organizations are using cloud services today, only 46 percent have moved mission-critical applications and data outside the enterprise. Significant inhibitors remain in ensuring effective cloud …

Distributed Access Control Architecture for Cloud Computing

Cloud computing has specific security challenges as multi-tenancy and virtualization fea­tures create risks due to sharing of physical resources among potential untrusted tenant. Het­erogeneity of services also requires different degrees of granularity in access control mechanisms. This article discusses a distributed architecture based on principles from security management and software …