This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Cloud-10 Service and Data Integration"
m (Created page with '==R6: Service and Data Integration == Category:OWASP Cloud ‐ 10 Project __NOTOC__ <headertabs/>') |
m (→R6: Service and Data Integration) |
||
Line 1: | Line 1: | ||
==R6: Service and Data Integration == | ==R6: Service and Data Integration == | ||
+ | Companies that are planning to adopt cloud must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit | ||
− | + | References: | |
− | + | Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). | |
− | + | Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). | |
− | + | de Assuncao, M. D., di Costanzo, A., & Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. Retrieved from http://doi.acm.org.library.capella.edu/10.1145/1551609.1551635 | |
− | + | Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981). | |
Revision as of 21:27, 22 December 2009
R6: Service and Data Integration
Companies that are planning to adopt cloud must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit
References: Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). de Assuncao, M. D., di Costanzo, A., & Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. Retrieved from http://doi.acm.org.library.capella.edu/10.1145/1551609.1551635 Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981).