Reference deployment models for eliminating user concerns on cloud security

被引:0
|
作者
Gansen Zhao
Chunming Rong
Martin Gilje Jaatun
Frode Eika Sandnes
机构
[1] South China Normal University,School of Computer Science
[2] University of Stavanger,Faculty of Science and Technology
[3] SINTEF ICT,Department of Software Engineering, Safety and Security
[4] Oslo University College,Faculty of Engineering
来源
关键词
Cloud computing; Cloud security; Reference deployment model; Security concerns;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing has become a hot topic both in research and in industry, and when making decisions on deploying/adopting cloud computing related solutions, security has always been a major concern. This article summarizes security related issues in cloud computing and proposes five service deployment models to address these issues. The proposed models provide different security related features to address different requirements and scenarios and can serve as reference models for deployment.
引用
收藏
页码:337 / 352
页数:15
相关论文
共 50 条
  • [41] Effects of security and privacy concerns on educational use of cloud services
    Arpaci, Ibrahim
    Kilicer, Kerem
    Bardakci, Salih
    COMPUTERS IN HUMAN BEHAVIOR, 2015, 45 : 93 - 98
  • [42] Cloud Security and Compliance Concerns: Demystifying stakeholders' roles and responsibilities
    Kandira, Muteveri
    Mtsweni, Jabu
    Padayachee, Keshnee
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 653 - 658
  • [43] Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
    Puri, Neha A.
    Karare, Ajay R.
    Dharmik, Rajesh. C.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1667 - 1671
  • [44] A quantitative analysis of current security concerns and solutions for cloud computing
    Nelson Gonzalez
    Charles Miers
    Fernando Redígolo
    Marcos Simplício
    Tereza Carvalho
    Mats Näslund
    Makan Pourzandi
    Journal of Cloud Computing: Advances, Systems and Applications, 1 (1):
  • [45] Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance
    Santoso, Nurudin
    Kusyanti, Ari
    Catherina, Harin Puspa Ayu
    Sari, Yustiyana April Lia
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (06) : 453 - 458
  • [46] Comparative Approach to Cloud Security Models
    Rohini, Temkar
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 170 - 177
  • [47] The Proposed Model for Security in the Cloud, Controlled by the End User
    Hyseni, Dhurate
    Cico, Betim
    Shabani, Isak
    2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 81 - 84
  • [48] Cloud Security Service for Identifying Unauthorized User Behaviour
    David, D. Stalin
    Anam, Mamoona
    Kaliappan, Chandraprabha
    Selvi, S. Arun Mozhi
    Sharma, Dilip Kumar
    Dadheech, Pankaj
    Sengan, Sudhakar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 2581 - 2600
  • [49] User-Level Runtime Security Auditing for the Cloud
    Majumdar, Suryadipta
    Madi, Taous
    Wang, Yushun
    Jarraya, Yosr
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1185 - 1199
  • [50] Cloud designs and deployment models: a systematic mapping study
    Isaac Odun-Ayo
    Rowland Goddy-Worlu
    Victoria Samuel
    Victor Geteloma
    BMC Research Notes, 12