Talk:Cloud computing security
This is the talk page for discussing improvements to the Cloud computing security article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
![]() | Computer security: Computing Start‑class | |||||||||||||||||
|
Merge with Computer Security?
There is nothing in this article that is distinct from the Computer Security article. We should probably consider merging this with Computer Security unless someone can come up with something that distinguishes "Cloud Computer" security from ordinary computer security. John (talk) 19:54, 26 April 2010 (UTC)
- While I'm unconvinced by the need for, and quality of this article I do think the subject is notable and the issues distinct as an application of computer security. I'd be more inclined to tag, stub and/or merge it with cloud computing. After all, we do have a (similarly problematic) Internet security article. -- samj inout 13:15, 27 April 2010 (UTC)
- I've tagged this article {{original-research}} and proposed that it be merged into the cloud computing article as it's basically just a list that could be condensed into a few sentences there. -- samj inout 17:44, 2 May 2010 (UTC)
- I think you should merge it. John (talk) 18:00, 23 June 2010 (UTC)
- I've put up merge banners to see if there is any more input on this. --Kvng (talk) 18:44, 21 December 2011 (UTC)
I am a co-chair of the Cloud Security Alliance Virtualization Working Group. The fundamental difference between cloud security and computer security is that in cloud security, you do not have the level of control that is assumed to be present in most computer security, and you are dealing with a fundamentally shared environment. So while many computer security topics fit within the requirements of cloud computing security, there are cloud-specific topics outside the domain of computer security. For this reason, they should be separate. Note also that CSA and NIST have separate cloud definitions and security guidelines apart from their core computer security guidelines. — Preceding unsigned comment added by 70.67.187.183 (talk) 00:37, 5 January 2012 (UTC)
I would second this vote to keep cloud security a separate article. Cloud computing has numerous vulnerabilities that are largely unique versus private computer installations (what is the opposite of cloud computing? Surface computing?). Cloud computing vulnerabilities are due to the reduced control and ownership of the equipment, the remote (possibly unknown) location, the increased usage of virtualization. There is a high interest in understanding these risks and possible countermeasures. Many consumers, businesses, and governments either delve into a cloud deployment prematurely or overly hesitate for lack of understanding of these issues. Describing these issues in a solid way will be a good amount of work, however. Cloud computing is already a long article. Adding in a good discussion of cloud security would overload that article. --Bikeborg (talk) 11:09, 21 February 2012 (UTC)
I would suggest that Cloud Computing Security and Cloud Computing should be kept separately and not merged. Cloud computing is a platform whereas security is an ocean, there are many vulnerabilities that are discovered and yet to be discovered with respect to cloud computing and various platforms that it offers (SaaS, PaaS & IaaS), Virtualization, internal threats are always on a rise and hence there is much more to discover with respect to security and cloud computing security alone, I would suggest to keep it separate. Bhupesh Mansukhani (talk) 20:20, 11 May 2012 (UTC)
- Oppose merge The security issue is a separate nightmare, excuse me, topic altogether. This issue can, and should, be handled in far greater detail than the general article. I supported the merge of the intro & main, but this one needs to be by itself. Going into the level of detail needed here will make the main article very hard to read. History2007 (talk) 22:56, 20 March 2012 (UTC)
- Oppose merge ,because the article is too long .--Wasami007 (talk) 08:34, 29 March 2012 (UTC)
As an Enterprise Architect at a fortune 500 company, I must say that security in the cloud space is significantly different from internal security in management, tehcnology and maturity perspectives. We see it as a new and challenging space, and value additional information specifically on the subject. — Preceding unsigned comment added by 142.56.86.35 (talk) 16:32, 30 March 2012 (UTC)
I don't think it should - Anon — Preceding unsigned comment added by 195.194.72.237 (talk) 09:23, 25 May 2012 (UTC)