Talk:Cloud computing security

This is an old revision of this page, as edited by Bikeborg (talk | contribs) at 11:09, 21 February 2012 (Merge with Computer Security?: Keep it.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Latest comment: 13 years ago by Bikeborg in topic Merge with Computer Security?
WikiProject iconComputer security: Computing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

Merge with Computer Security?

There is nothing in this article that is distinct from the Computer Security article. We should probably consider merging this with Computer Security unless someone can come up with something that distinguishes "Cloud Computer" security from ordinary computer security. John (talk) 19:54, 26 April 2010 (UTC)Reply

While I'm unconvinced by the need for, and quality of this article I do think the subject is notable and the issues distinct as an application of computer security. I'd be more inclined to tag, stub and/or merge it with cloud computing. After all, we do have a (similarly problematic) Internet security article. -- samj inout 13:15, 27 April 2010 (UTC)Reply
I've tagged this article {{original-research}} and proposed that it be merged into the cloud computing article as it's basically just a list that could be condensed into a few sentences there. -- samj inout 17:44, 2 May 2010 (UTC)Reply
I think you should merge it. John (talk) 18:00, 23 June 2010 (UTC)Reply
I've put up merge banners to see if there is any more input on this. --Kvng (talk) 18:44, 21 December 2011 (UTC)Reply

I am a co-chair of the Cloud Security Alliance Virtualization Working Group. The fundamental difference between cloud security and computer security is that in cloud security, you do not have the level of control that is assumed to be present in most computer security, and you are dealing with a fundamentally shared environment. So while many computer security topics fit within the requirements of cloud computing security, there are cloud-specific topics outside the ___domain of computer security. For this reason, they should be separate. Note also that CSA and NIST have separate cloud definitions and security guidelines apart from their core computer security guidelines. — Preceding unsigned comment added by 70.67.187.183 (talk) 00:37, 5 January 2012 (UTC)Reply

I would second this vote to keep cloud security a separate article. Cloud computing has numerous vulnerabilities that are largely unique versus private computer installations (what is the opposite of cloud computing? Surface computing?). Cloud computing vulnerabilities are due to the reduced control and ownership of the equipment, the remote (possibly unknown) ___location, the increased usage of virtualization. There is a high interest in understanding these risks and possible countermeasures. Many consumers, businesses, and governments either delve into a cloud deployment prematurely or overly hesitate for lack of understanding of these issues. Describing these issues in a solid way will be a good amount of work, however. Cloud computing is already a long article. Adding in a good discussion of cloud security would overload that article. --Bikeborg (talk) 11:09, 21 February 2012 (UTC)Reply