J Supercomput (2012) 61:337–352 DOI 10.1007/s11227-010-0460-9 Reference deployment models for eliminating user concerns on cloud security Gansen Zhao · Chunming Rong · Martin Gilje Jaatun · Frode Eika Sandnes Published online: 17 June 2010 © Springer Science+Business Media, LLC 2010 Abstract Cloud computing has become a hot topic both in research and in industry, and when making decisions on deploying/adopting cloud computing related solu- tions, security has always been a major concern. This article summarizes security related issues in cloud computing and proposes five service deployment models to address these issues. The proposed models provide different security related features to address different requirements and scenarios and can serve as reference models for deployment. Keywords Cloud computing · Cloud security · Reference deployment model · Security concerns 1 Introduction Extensive research efforts have been put on cloud computing and its related technolo- gies, resulting in several well acknowledged cloud computing theories and technolo- gies. Cloud computing is a collection of technologies that allow IT resources to be virtualized, used on an on-demand basis and delivered via the Internet as services. G. Zhao () School of Computer Science, South China Normal University, Guangzhou, China e-mail: gzhao@scnu.edu.cn C. Rong Faculty of Science and Technology, University of Stavanger, Stavanger, Norway M.G. Jaatun Department of Software Engineering, Safety and Security, SINTEF ICT, Trondheim, Norway F.E. Sandnes Faculty of Engineering, Oslo University College, Oslo, Norway