Security in the Cloud Computing: A Review

被引:0
作者
Nie, Xiao [1 ]
Suo, Hui [1 ]
机构
[1] Guangdong Jidian Polytech, Coll Informat Engn, Guangzhou, Guangdong, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
cloud computing; security; privacy; challenges;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cloud computing has been a focus of research. Security and privacy are the key issues for cloud computing applications, and still face some enormous challenges. In order to facilitate this emerging domain, we firstly in brief review the characteristics, delivery models and deployment models of cloud computing, and then pay attention to the security based on above characteristics and models. By means of deeply analyzing the security challenges, the current security technologies and research status are given. On the basis of these, we raise a propose solution from three aspects: enterprise users, cloud operators and regulators, and deeply illustrate that any one of the three should adopt the corresponding technologies to promote the application of cloud computing.
引用
收藏
页码:2145 / 2149
页数:5
相关论文
共 13 条
[1]  
[Anonymous], 2009, NIST WORKIN IN PRESS
[2]  
[Anonymous], SEC GUID CRIT AR FOC
[3]  
Bo Ming-xia, 2011, INFORM SECURITY TECH, P61
[4]  
Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
[5]   Understanding Cloud Computing Vulnerabilities [J].
Grobauer, Bernd ;
Walloschek, Tobias ;
Stoecker, Elmar .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :50-57
[6]  
Jansen W.A., 2011, guidelines on security and privacy in public cloud computing
[7]   Data Security in the World of Cloud Computing [J].
Kaufman, Lori M. .
IEEE SECURITY & PRIVACY, 2009, 7 (04) :61-64
[8]   Establishing Trust in Cloud Computing [J].
Khan, Khaled M. ;
Malluhi, Qutaibah .
IT PROFESSIONAL, 2010, 12 (05) :20-26
[9]  
Nin, 2009, P 18 ACM C INFORM KN, P2117
[10]   Cloud Computing The New Frontier of Internet Computing [J].
Pallis, George .
IEEE INTERNET COMPUTING, 2010, 14 (05) :70-73