Security Architectures for Cloud Computing

被引:0
|
作者
Okuhara, Masayuki [1 ,2 ]
Shiozaki, Tetsuo [1 ,2 ]
Suzuki, Takuya [2 ]
机构
[1] Fujitsu Ltd, Fujitsus Informat Secur Ctr, Tokyo, Japan
[2] Fujitsu Ltd, Strateg Planning IT Secur Solut Business, Tokyo, Japan
来源
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Moving computing into the "Cloud" makes computer processing much more convenient for users but also presents them with new security problems about safety and reliability. To solve these problems, service providers must establish and provide security architectures for Cloud computing. This paper describes domestic and international trends in security requirements for Cloud computing, along with security architectures proposed by Fujitsu such as access protocol, authentication and identity (ID) management, and security visualization.
引用
收藏
页码:397 / 402
页数:6
相关论文
共 50 条
  • [41] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [42] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [43] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [44] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [45] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [46] Improved Cloud Computing Security
    Hameed, Rasha Talal
    Hussain, Abdulatif Ali
    Mohamad, Omar Abdulwahabe
    Zidan, Khamis A.
    Hamid, Omar Talal
    Salman, Saba Abdulbaqi
    [J]. 2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 170 - 175
  • [47] Security in the Cloud Computing: A Review
    Nie, Xiao
    Suo, Hui
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2145 - 2149
  • [48] A note on cloud computing security
    Garg, Deepak
    Sidhu, Jagpreet
    Rani, Shalli
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 33 (03) : 133 - 154
  • [49] Security Issues in Cloud Computing
    Borazjani, Parnian Najafi
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 800 - 811
  • [50] Cloud Computing and Security Challenges
    Yu, Huiming
    Powell, Nakia
    Stembridge, Dexter
    Yuan, Xiaohong
    [J]. PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,