A Research on Cloud Computing Security

被引:5
|
作者
Zhang, Ni [1 ]
Liu, Di [2 ]
Zhang, Yun-Yong [1 ]
机构
[1] China Unicom Res Inst, Beijing, Peoples R China
[2] Grp Co Ltd Postdoctoral, China United Network Commun, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud security; Cloud Computing; data security; Security as a service;
D O I
10.1109/ITA.2013.91
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper gives an overview on cloud computing security. To clarify cloud security, a definition and scope of cloud computing security is presented. An ecosystem of cloud security is shown to illustrate what each role in industry can do in turn. Then security impacts of cloud security for both customers and operators are analyzed. To overcome challenges from cloud security, many state-of-the-art technical solutions, e.g., continuation protection mechanism, IDM, data security, and virtualization security are discussed. Finally, best practices on perspective of operator are summarized and a conclusion is conducted.
引用
下载
收藏
页码:370 / 373
页数:4
相关论文
共 50 条
  • [31] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [32] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [33] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [34] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [35] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
  • [36] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [37] Research on Job Security Scheduling Strategy in Cloud Computing Model
    Zhang, Hanqing
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 649 - 652
  • [38] Research on the Security based on Utility Theory in Cloud Computing Environment
    Ju, JieHui
    Wang, ZhongYou
    Li, WenJuan
    Bao, WeiZheng
    Wang, Ya
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 321 - 328
  • [39] Research of Data Security Model in Cloud Computing Platform for SMEs
    Sun, Tao
    Wang, Xinjun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 97 - 107
  • [40] Research on the Computer Network Security Problems under the Cloud Computing
    Zhang, Ran
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 830 - 834