Cloud computing security study based on the mobile Internet environment

被引:0
|
作者
Ding, Wen [1 ]
机构
[1] Human Mech & Elect Polytech, Changsha, Hunan, Peoples R China
关键词
Internet; cloud computing; security issue; access control;
D O I
10.2495/ISME20132593
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a new model which combines IT technologies and services, cloud computing has basically been recognized by market, while its security has drawn the users' attention. This paper introduces cloud computing system and its characteristics. Then the paper conducts further analysis and studies aiming at the security issues.
引用
收藏
页码:1993 / 1998
页数:6
相关论文
共 50 条
  • [31] Convergence of Internet of things and mobile cloud computing
    Psannis, K. E.
    Xinogalos, S.
    Sifaleras, A.
    [J]. SYSTEMS SCIENCE & CONTROL ENGINEERING, 2014, 2 (01) : 476 - 483
  • [32] SECURITY FRAMEWORKS FOR MOBILE CLOUD COMPUTING: A SURVEY
    Kulkarni, Pallavi
    Khanai, Rajashri
    Bindagi, Gururaj
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2507 - 2511
  • [33] Security Issues and Challenges of Mobile Cloud Computing
    Shahzad, Abid
    Hussain, Mureed
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (06): : 37 - 49
  • [34] Mobile Cloud Computing Environment as a Support for Mobile Learning
    Kitanov, Stojan
    Davcev, Danco
    [J]. THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 99 - 105
  • [35] Cloud Platform Based Automated Security Testing System for Mobile Internet
    Tao, Dan
    Lin, Zhaowen
    Lu, Cheng
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2015, 20 (06) : 537 - 544
  • [36] Cloud Platform Based Automated Security Testing System for Mobile Internet
    Dan Tao
    Zhaowen Lin
    Cheng Lu
    [J]. Tsinghua Science and Technology, 2015, 20 (06) : 537 - 544
  • [37] A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    Khan, Atta Ur Rehman
    [J]. 2013 IEEE SYMPOSIUM ON WIRELESS TECHNOLOGY & APPLICATIONS (ISWTA2013), 2013, : 62 - 67
  • [38] Enhancement for Data Security in Cloud Computing Environment
    Gawali, M. B.
    Wagh, R. B.
    [J]. 3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [39] Elements of Application Security In the Cloud Computing Environment
    Mathew, George
    [J]. 2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 174 - 179
  • [40] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    [J]. INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)