9Summary and Future Work

Roy H. Campbell

Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA

The adoption of cloud computing by the U.S. government, including the Department of Defense, is proceeding quickly [1–4] and is likely to become widespread [5]. As government becomes more comfortable with the technology, mission-oriented cloud computing seems inevitable. However, security remains a top concern in the use of clouds for dependable and trustworthy computing [6], even as FedRAMP [7] and other standards converge to a common set of requirements, as discussed in Chapter 8. The cloud computing environment is maturing, but we are observing the rise of new aspects of cloud computing – such as mobiles interconnected into clouds, real-time concerns, edge computing, and machine learning – that are challenging the existing techniques for testing, validation, verification, robustness, and resistance to attack. As reflected in this book, academia and industry are attempting to respond quickly to rapidly changing cloud technologies, as driven by the value of these technologies in today's society.

The preceding chapters of this book have touched on many of the concerns arising from cloud technology: survivability, risks, benefits, detection, security, scalability, workloads, performance, resource management, validation and verification, theoretical problems, and certification. In this final chapter, we will consider what has been learned since 2007 ...

Get Assured Cloud Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.