A Research on Cloud Computing Security

被引:5
|
作者
Zhang, Ni [1 ]
Liu, Di [2 ]
Zhang, Yun-Yong [1 ]
机构
[1] China Unicom Res Inst, Beijing, Peoples R China
[2] Grp Co Ltd Postdoctoral, China United Network Commun, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud security; Cloud Computing; data security; Security as a service;
D O I
10.1109/ITA.2013.91
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper gives an overview on cloud computing security. To clarify cloud security, a definition and scope of cloud computing security is presented. An ecosystem of cloud security is shown to illustrate what each role in industry can do in turn. Then security impacts of cloud security for both customers and operators are analyzed. To overcome challenges from cloud security, many state-of-the-art technical solutions, e.g., continuation protection mechanism, IDM, data security, and virtualization security are discussed. Finally, best practices on perspective of operator are summarized and a conclusion is conducted.
引用
下载
收藏
页码:370 / 373
页数:4
相关论文
共 50 条
  • [1] Research On Cloud Computing And Security
    Yu, Ting-ting
    Zhu, Ying-Guo
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 314 - 316
  • [2] Research on the Security Issues of Cloud Computing
    Jia Weihua
    Sun Shibing
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 845 - 848
  • [3] Cloud Computing Security Case Studies and Research
    Barron, Chimere
    Yu, Huiming
    Zhan, Justin
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1287 - 1291
  • [4] Research on Key Security Strategies of Cloud Computing
    Zhao, Duanyang
    Xu, Qingxiang
    Hu, Xiaxia
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1577 - 1580
  • [5] The Research on Cloud computing data security mechanism
    Xu Xiaoping
    Yan Junhu
    Liu Lan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1595 - 1599
  • [6] The Research on Cloud computing security model and Countermeasures
    Tang, JianGang
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1196 - 1200
  • [7] A research for cloud computing security risk assessment
    Tang H.
    Yang J.
    Wang X.
    Zhou Q.
    Open Cybernetics and Systemics Journal, 2016, 10 : 210 - 217
  • [8] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [9] Research on Security of the Client Based on Cloud Computing
    Xu Xiaoping
    Yan Junhu
    2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 1 - 6
  • [10] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327