Talk:Cloud computing security

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 2 September 2021 and 13 December 2021. Further details are available on the course page. Student editor(s): Cmg373, Starspace50, Pjf125, Wonchari93, AurelionWho.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 17:52, 16 January 2022 (UTC)7uuuuiu

Merge with Computer Security?
There is nothing in this article that is distinct from the Computer Security article. We should probably consider merging this with Computer Security unless someone can come up with something that distinguishes "Cloud Computer" security from ordinary computer security. John (talk) 19:54, 26 April 2010 (UTC)


 * While I'm unconvinced by the need for, and quality of this article I do think the subject is notable and the issues distinct as an application of computer security. I'd be more inclined to tag, stub and/or merge it with cloud computing. After all, we do have a (similarly problematic) Internet security article. -- samj in out 13:15, 27 April 2010 (UTC)


 * I've tagged this article original-research and proposed that it be merged into the cloud computing article as it's basically just a list that could be condensed into a few sentences there. -- samj in out 17:44, 2 May 2010 (UTC)


 * I think you should merge it. John (talk) 18:00, 23 June 2010 (UTC)


 * I've put up merge banners to see if there is any more input on this. --Kvng (talk) 18:44, 21 December 2011 (UTC)

I am a co-chair of the Cloud Security Alliance Virtualization Working Group. The fundamental difference between cloud security and computer security is that in cloud security, you do not have the level of control that is assumed to be present in most computer security, and you are dealing with a fundamentally shared environment. So while many computer security topics fit within the requirements of cloud computing security, there are cloud-specific topics outside the domain of computer security. For this reason, they should be separate. Note also that CSA and NIST have separate cloud definitions and security guidelines apart from their core computer security guidelines. — Preceding unsigned comment added by 70.67.187.183 (talk) 00:37, 5 January 2012 (UTC)

I would second this vote to keep cloud security a separate article. Cloud computing has numerous vulnerabilities that are largely unique versus private computer installations (what is the opposite of cloud computing? Surface computing?). Cloud computing vulnerabilities are due to the reduced control and ownership of the equipment, the remote (possibly unknown) location, the increased usage of virtualization. There is a high interest in understanding these risks and possible countermeasures. Many consumers, businesses, and governments either delve into a cloud deployment prematurely or overly hesitate for lack of understanding of these issues. Describing these issues in a solid way will be a good amount of work, however. Cloud computing is already a long article. Adding in a good discussion of cloud security would overload that article. --Bikeborg (talk) 11:09, 21 February 2012 (UTC)

I would suggest that Cloud Computing Security and Cloud Computing should be kept separately and not merged. Cloud computing is a platform whereas security is an ocean, there are many vulnerabilities that are discovered and yet to be discovered with respect to cloud computing and various platforms that it offers (SaaS, PaaS & IaaS), Virtualization, internal threats are always on a rise and hence there is much more to discover with respect to security and cloud computing security alone, I would suggest to keep it separate. Bhupesh Mansukhani (talk) 20:20, 11 May 2012 (UTC)


 * Oppose merge The security issue is a separate nightmare, excuse me, topic altogether. This issue can, and should, be handled in far greater detail than the general article. I supported the merge of the intro & main, but this one needs to be by itself. Going into the level of detail needed here will make the main article very hard to read. History2007 (talk) 22:56, 20 March 2012 (UTC)
 * Oppose merge ,because the article is too long .--Wasami007 (talk) 08:34, 29 March 2012 (UTC)

As an Enterprise Architect at a fortune 500 company, I must say that security in the cloud space is significantly different from internal security in management, tehcnology and maturity perspectives. We see it as a new and challenging space, and value additional information specifically on the subject. — Preceding unsigned comment added by 142.56.86.35 (talk) 16:32, 30 March 2012 (UTC)

I don't think it should - Anon — Preceding unsigned comment added by 195.194.72.237 (talk) 09:23, 25 May 2012 (UTC)

Wiki Education assignment: Research Process and Methodology - FA22 - Sect 200 - Thu
— Assignment last updated by Omnicass (talk) 20:04, 22 October 2022 (UTC)

Wiki Education assignment: Research Process and Methodology - FA23 - Sect 201 - Thu
— Assignment last updated by Artisticrush (talk) 22:06, 20 November 2023 (UTC)