Institute of Electrical and Electronics Engineers
The cloud computing is a paradigm involving many disparate stake holders. Any system built upon this paradigm and a business run on such system architecture would have similarly disparate scope of access, activities and responsibilities for the stake holders. Depending on the scope of the activities and responsibilities, a stakeholder has to device the security measures to secure his activity space. The authors formulate the problem formally with this premise. They model and survey, depending upon the generic cloud architecture abstracted from the prominent ones, the activity space of each stake holder and consequently security measures each stake holder has to take, to ensure the overall security of the system.