The Research on Cloud Computing Security Model and Countermeasures

Article Preview

Abstract:

Cloud computing is an open structure which have complexity, on-demand services, virtualization, resource pooling, rapid elasticity and multi-tenant architecture, etc. The security issues have become a bottleneck restricting the development of cloud computing. This paper analyzes the characteristics of cloud computing services, security requirements and security issues, given security strategies and a cloud computing model. It requires the use of cloud computing architecture data centers, virtualization platforms, cloud services, cloud terminal interfaces and cloud terminal to establish a secure cloud computing model. It needs considerations from prevention, surveillance and response to ensure the implementation and management. Cloud computing security is not just technical issues, it also involves many standardization, regulatory approach, laws and regulations and follow the existing security best practices can enhance the security of cloud computing.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1196-1200

Citation:

Online since:

February 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] China Telecom Network Security Lab, in: Cloud computing security technology and applications, Electronic Industry Press, China, (2012), in press.

Google Scholar

[2] Vic (J.R. ) Winkler, in: Securing the Cloud: Cloud Computer Security Techniques and Tactics, China Machine Press, China, (2013), in press.

Google Scholar

[3] Yun Chi, Research on Security Issues of Cloud Computing. Information Security and Technology. Vol. 09 (2013), pp.54-62.

Google Scholar

[4] TimMather,Subra Kumaraswamy, Shahed Latif, in: Cloud Computing Security and Privacy, China Machine Press, China, (2011), in press.

Google Scholar

[5] Yanan Li, Research on cloud computing security issues. China New Telecommunications. Vol. 07 (2013), pp.21-22.

Google Scholar

[6] Hongzhen Wang, Lihua Xie, Summary of Cloud Computing and Its Security Problems. Review of Modern Computer. Vol. 06(2013), pp.12-15.

Google Scholar