Security Architectures for Cloud Computing

被引:0
|
作者
Okuhara, Masayuki [1 ,2 ]
Shiozaki, Tetsuo [1 ,2 ]
Suzuki, Takuya [2 ]
机构
[1] Fujitsu Ltd, Fujitsus Informat Secur Ctr, Tokyo, Japan
[2] Fujitsu Ltd, Strateg Planning IT Secur Solut Business, Tokyo, Japan
来源
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Moving computing into the "Cloud" makes computer processing much more convenient for users but also presents them with new security problems about safety and reliability. To solve these problems, service providers must establish and provide security architectures for Cloud computing. This paper describes domestic and international trends in security requirements for Cloud computing, along with security architectures proposed by Fujitsu such as access protocol, authentication and identity (ID) management, and security visualization.
引用
收藏
页码:397 / 402
页数:6
相关论文
共 50 条
  • [1] Cloud Computing Architectures
    Tianfield, Huaglory
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 1394 - 1399
  • [2] An overview of cloud-fog computing: Architectures, applications with security challenges
    Kunal, Sourav
    Saha, Arijit
    Amin, Ruhul
    [J]. SECURITY AND PRIVACY, 2019, 2 (04):
  • [3] Security in cloud computing
    [J]. International Journal of Information Security, 2014, 13 : 95 - 96
  • [4] Security for Cloud Computing
    Nazeer, Shahrin A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [5] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    [J]. RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [6] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [7] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    [J]. 2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [8] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [9] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [10] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    [J]. ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955