Research of Security Model and Cloud Computing Strategy

Article Preview

Abstract:

Cloud computing is a fast-developing Internet computing paradigm. It includes large numbers of IT resources, forms a large virtual resources pool, and offers the remote Internet users on-demand IT services. The easy, cheap and elastic resources in cloud are pulling increasing attentions of the enterprises and users. It is becoming the attention of the academia, industrial sectors and governments. However, the security problem is confining its popularization and development.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6196-6198

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Dean J, Ghemawat S. MapReduce: a flexible data processing tool [J]. Commun ACM, 2010, 53(1): 72-77.

DOI: 10.1145/1629175.1629198

Google Scholar

[2] Decandia G, Hastorun D, Jampani M, et al. Dynamo: amazon's highly available key-value store [A]. SOSP'07 [C]. Stevenson, Washington, USA: ACM, 2007. 205-220.

DOI: 10.1145/1323293.1294281

Google Scholar

[3] Liu Q, Weng C L, Li M L, et al. An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds [J]. IEEE Security and Privacy, 2010, 8(6): 56-62.

DOI: 10.1109/msp.2010.143

Google Scholar

[4] Abadi M, Feigenbaum J. Secure Circuit Evalution[J]. Journal of Cryptology, 1990, 2(1): 1-12.

Google Scholar

[5] Abadi M, Feigenbaum J, Kilian J. On Hiding Information from an Oracle [J]. Journal of computer and system sciences, 1989, 39(1): 21-50.

DOI: 10.1016/0022-0000(89)90018-4

Google Scholar