Reference deployment models for eliminating user concerns on cloud security

被引:0
|
作者
Gansen Zhao
Chunming Rong
Martin Gilje Jaatun
Frode Eika Sandnes
机构
[1] South China Normal University,School of Computer Science
[2] University of Stavanger,Faculty of Science and Technology
[3] SINTEF ICT,Department of Software Engineering, Safety and Security
[4] Oslo University College,Faculty of Engineering
来源
关键词
Cloud computing; Cloud security; Reference deployment model; Security concerns;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing has become a hot topic both in research and in industry, and when making decisions on deploying/adopting cloud computing related solutions, security has always been a major concern. This article summarizes security related issues in cloud computing and proposes five service deployment models to address these issues. The proposed models provide different security related features to address different requirements and scenarios and can serve as reference models for deployment.
引用
收藏
页码:337 / 352
页数:15
相关论文
共 50 条
  • [31] User Data Control Protocol for Cloud Security
    Rao, Gumpina Babu
    Devi, G. Lavanya
    Murthy, N. V. E. S.
    HELIX, 2019, 9 (01): : 4763 - 4768
  • [32] Deployment Models and Optimization Procedures in Cloud Computing
    Kotowski, Jerzy
    Oko, Jacek
    Ochla, Mariusz
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2015, 2015, 9520 : 805 - 812
  • [33] Building a security reference architecture for cloud systems
    Fernandez, Eduardo B.
    Monge, Raul
    Hashizume, Keiko
    REQUIREMENTS ENGINEERING, 2016, 21 (02) : 225 - 249
  • [34] Building a security reference architecture for cloud systems
    Eduardo B. Fernandez
    Raul Monge
    Keiko Hashizume
    Requirements Engineering, 2016, 21 : 225 - 249
  • [35] A Security Risk Assessment Model for Business Process Deployment in the Cloud
    Goettelmann, Elio
    Dahman, Karim
    Gateau, Benjamin
    Dubois, Eric
    Godart, Claude
    2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 307 - 314
  • [36] Evaluating cloud deployment scenarios based on security and privacy requirements
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Islam, Shareeful
    REQUIREMENTS ENGINEERING, 2013, 18 (04) : 299 - 319
  • [37] Evaluating cloud deployment scenarios based on security and privacy requirements
    Christos Kalloniatis
    Haralambos Mouratidis
    Shareeful Islam
    Requirements Engineering, 2013, 18 : 299 - 319
  • [38] Current Cloud Computing Security Concerns from Consumer Perspective
    Hafiz Gulfam Ahmad
    Zeeshan Ahmad
    机床与液压, 2013, 41 (24) : 1 - 5
  • [39] Maintaining Security Concerns to Cloud Services and Its Application Vulnerabilities
    Reddy, Lakkireddy Venkateswara
    Viswanath, Vajragiri
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM 2016, 2017, 556 : 227 - 236
  • [40] A quantitative analysis of current security concerns and solutions for cloud computing
    Gonzalez, Nelson
    Miers, Charles
    Redigolo, Fernando
    Simplicio, Marcos
    Carvalho, Tereza
    Naslund, Mats
    Pourzandi, Makan
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1