Key Problems to the Application of Cloud Computing

被引:0
作者
Guo Lizheng [1 ]
He, Zhongyao [1 ]
机构
[1] Henan Univ Urban Construct, Dept Comp Sci & Engn, Pingdingshan, Henan, Peoples R China
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RESOURCE ENVIRONMENT AND INFORMATION TECHNOLOGY IN 2010 (REIT' 2010) | 2010年
关键词
cloud computing; interoperability; security; available;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a new computing paradigm. It's main feature is to reduce the cost of software and hardware of a application, share date, calculation, and service. Although some vendors has started selling cloud computing products, there are some key problems in various areas, such as security, available, interoperability are still unclear. In this paper, we analyze the interoperability, security and available, then provide the resolve method.
引用
收藏
页码:407 / 409
页数:3
相关论文
共 50 条
[21]   An Efficient Key Distribution Scheme in Cloud Computing [J].
Tang, Chumming ;
Wong, Duncan S. ;
Hu, Xing ;
Pei, Dingyi .
2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
[22]   Key Issues for the Successful Adoption of Cloud Computing [J].
Branco, Teofilo, Jr. ;
de Sa-Soares, Filipe ;
Lopez Rivero, Alfonso .
CENTERIS 2017 - INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / PROJMAN 2017 - INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / HCIST 2017 - INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERI, 2017, 121 :115-122
[23]   Key Factors Impacting Cloud Computing Adoption [J].
Morgan, Lorraine ;
Conboy, Kieran .
COMPUTER, 2013, 46 (10) :97-99
[24]   Cloud Computing Implementation: Key Issues and Solutions [J].
Rastogi, Garima ;
Sushil, Rama .
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, :320-324
[25]   Key techniques of access control for cloud computing [J].
Feng, Chao-Sheng ;
Qin, Zhi-Guang ;
Yuan, Ding ;
Qing, Yu .
Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02) :312-319
[26]   Key Security Technologies of Cloud Computing Platforms [J].
Liang Junjie .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 :411-417
[27]   Security Issues of Mobile Application Using Cloud Computing [J].
Cimler, Richard ;
Matyska, Jan ;
Balik, Ladislav ;
Horalek, Josef ;
Sobeslav, Vladimir .
AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT, AECIA 2014, 2015, 334 :347-357
[28]   A Token-based Authentication and Key Agreement Protocol for Cloud Computing [J].
Xu, Zisang ;
Xu, Jianbo ;
Kuang, Li-Dan .
2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, :38-43
[29]   Design of secure protocol for session key exchange in vehicular cloud computing [J].
Kang, Jungho ;
Park, Jong Hyuk .
Lecture Notes in Electrical Engineering, 2015, 373 :249-254
[30]   Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism [J].
Altowaijri, Saleh M. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09) :1-10