Cloud Computing and Security Measure

被引:0
作者
Meetei, Mutum Zico [1 ]
机构
[1] Jazan Univ, Dept Math, Jazan, Saudi Arabia
来源
2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3 | 2013年
关键词
Cloud computing; Service delivery models; Security risk;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is the most popular and smart technology, among all other computing paradigm such as parallel computing, distributed computing, and grid computing. It is defined as on-demand network access to a shared pool of configurable resources (e. g. network). The main idea of cloud is to provide on-demand computing services with high reliability, scalability and availability in a distributed environment. Outsourcing and extension of business through cloud has provided customer an ease of the local data storage and maintenance. However, the customer no longer has physical possession of the possibly large size of outsourced data. This draws a security concern on the data integrity protection in cloud computing especially for customers with constrained computing resources and capabilities. Security is one of the major factor that hampers the growth of cloud computing. An estimation of security risks in cloud computing systems is an essential part of the process of security measures. For a proper estimation of security risk requires a good knowledge about the probability distributions of different upcoming events. This paper focuses on security measures and simulation of security risk in cloud computing. Probability distribution model is used for simulation of possible security risk in cloud services.
引用
收藏
页码:852 / 857
页数:6
相关论文
共 12 条
[1]   Cloud Computing Distributed Internet Computing for IT and Scientific Research [J].
Dikaiakos, Marios D. ;
Pallis, George ;
Katsaros, Dimitrios ;
Mehra, Pankaj ;
Vakali, Athena .
IEEE INTERNET COMPUTING, 2009, 13 (05) :10-13
[2]  
Foster I.T., 2009, ABS09010131 CORR
[3]  
Jin H, 2010, COMPUT COMMUN NETW S, P3, DOI 10.1007/978-1-84996-241-4_1
[4]   Security and Control in the Cloud [J].
Julisch, Klaus ;
Hall, Michael .
INFORMATION SECURITY JOURNAL, 2010, 19 (06) :299-309
[5]  
Meetei Mutum Zico, 2012, 2012 5th International Conference on BioMedical Engineering and Informatics (BMEI), P1321, DOI 10.1109/BMEI.2012.6513028
[6]  
Nithiavathy R., 2013, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), P125, DOI 10.1109/ICPRIME.2013.6496459
[7]  
Rimal B. P., 2011, J GRID COMPUTING, V9
[8]  
Rosenthal A., 2010, J BIOMEDICAL INFORM, V43, P53
[9]  
Ryan MD, 2010, COMMUN ACM, V54, P8
[10]   Security and Privacy in Cloud Computing [J].
Xiao, Zhifeng ;
Xiao, Yang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02) :843-859