A Research on Cloud Computing Security

被引:5
|
作者
Zhang, Ni [1 ]
Liu, Di [2 ]
Zhang, Yun-Yong [1 ]
机构
[1] China Unicom Res Inst, Beijing, Peoples R China
[2] Grp Co Ltd Postdoctoral, China United Network Commun, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud security; Cloud Computing; data security; Security as a service;
D O I
10.1109/ITA.2013.91
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper gives an overview on cloud computing security. To clarify cloud security, a definition and scope of cloud computing security is presented. An ecosystem of cloud security is shown to illustrate what each role in industry can do in turn. Then security impacts of cloud security for both customers and operators are analyzed. To overcome challenges from cloud security, many state-of-the-art technical solutions, e.g., continuation protection mechanism, IDM, data security, and virtualization security are discussed. Finally, best practices on perspective of operator are summarized and a conclusion is conducted.
引用
下载
收藏
页码:370 / 373
页数:4
相关论文
共 50 条
  • [41] Research on Cloud Computing and Network Security in Digital Manufacturing Platform
    Chang, Zhenyun
    Zhao, Yuling
    Qian, Dongmei
    Wang, Ning
    GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 219 - 222
  • [42] Research on security mechanism for cloud computing of drug control system
    Zhong L.
    Luo Z.
    Zhang Y.
    Miao Y.
    Luo, Zhenjun, 2016, American Scientific Publishers (13) : 1426 - 1435
  • [43] A Research on The Indicator System of Cloud Computing Security Risk Assessment
    Zhang, Jijun
    Sun, Dejian
    Zhai, Donghang
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 121 - 123
  • [44] Research of the Data Security Related Issues in Cloud Computing Services
    Hu, Nan
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 145 - 148
  • [45] RESEARCH ON SECURITY EVALUATION OF CLOUD COMPUTING BASED ON ATTACK GRAPH
    Cheng, Yexia
    Du, Yuejin
    Xu, Junfeng
    Yuan, Chunyang
    Xue, Zhi
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 459 - 465
  • [46] Security Mechanism Analysis and Research of Hadoop Cloud Computing Cluster
    Xue, Hong-ye
    Zhai, Rui-tao
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 366 - 371
  • [47] Research of Library Information Security Based on Cloud Computing Platform
    Yang Fangjing
    Liu Yinhong
    Chen Xinyan
    Zhang Ronghui
    PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND HIGHER EDUCATION (ICSSHE 2018), 2018, 181 : 776 - 780
  • [48] Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress
    Ramireddy, Srilakshmi
    Chakraborthy, Rajarshi
    Raghu, T. S.
    Rao, H. Raghav
    AMCIS 2010 PROCEEDINGS, 2010,
  • [49] Research on the Application and Security of Cloud Computing in Smart Power Grids
    Chen Bin
    Yu Xiaoyi
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 784 - 786
  • [50] Research on Data Security Access Model of Cloud Computing Platform
    Zhu, Yangqing
    Zuo, Jun
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 424 - 428