A Comprehensive Security Strategy Applying to the Total Life Cycle of Cloud Computing Data Center

Article Preview

Abstract:

Aiming at the security issues of cloud computing data center, the systematic security construction architecture of cloud computing data center is proposed. By surrounding the key aspects of security construction, such as infrastructure security, virtual security, cloud authentication and authorization, data isolation and protection, cloud platform and cloud service security, security operation maintenance, cloud computing platform migration, and disaster recovery backup, the security architecture constructs a multi-level, multi-angle tridimensional defense system in depth. It ensures the life cycle security for resource services of the cloud computing data center. Many key problems are further discussed in detail, such as the problem of data storage security, security domain isolation, cloud computing platform tenants accessing, and terminal accessing. This paper provides reference for the security construction of cloud computing data center, and gives guide to the implementation of the relevant security measures.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6259-6261

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Fang Jing, Wu Hao, Bai Songlin. Virtualization Security Issues in Cloud Computing. Telecommunications Science. 2012, 4: 135-140.

Google Scholar

[2] Duan Yong, Zhu Yuan. Research on Security Policies of the Infrastructure as a Service in IDC. Telecommunications Science. 2010, 6: 36-41.

Google Scholar

[3] Zhao Ji-zhi, Li Jin. Study on Cloud Computing Data center and Standardization Development. Information Technology & Standardization. 2011, 3: 30-34.

Google Scholar

[4] Zhao Lei-ting. Study on the Development of Carrier-grade Cloud Computing Data Center. Information Security and Technology. 2011, 8: 36-39.

Google Scholar

[5] FENG Deng-Guo, ZHANG Min, ZHANG Yan, etal. Study on Cloud Computing Security. Journal of Software. 2011, 22(1): 71−83.

Google Scholar

[6] Christopher S. Yoo. Cloud Computing: Architectural and Policy Implications. Review of Industrial Organization. 2011, 38: 405-421.

DOI: 10.1007/s11151-011-9295-7

Google Scholar