The Establishment of Information Management Security under Cloud Computing Environment

Article Preview

Abstract:

Cloud computing is Internet-based computing model which can share new information resources through virtualization, it can be dynamically according to the user needs to provide computing, storage, network bandwidth, software and other resources and it has great market potential and become the focus of the current IT giants construction of the project. However, just as other new things, there are flaws and loopholes need to continuously improve and enhance the development process in the future of cloud computing. In this paper, the development process of computing services of cloud security incidents is discussed and we analyzes the potential security risks of cloud computing services, security building and then put forward the ideas of security management development under cloud computing environment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2405-2408

Citation:

Online since:

January 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Y Enzi CC, EI-Hoiydi A., Decotignie J.D., Peiris V, WiseNET: Journal of Nanjing University of Posts and Telecommunications, Vo1. 4 (2010) No. 26, pp.20-29.

Google Scholar

[2] Huang Miao Yun, Li is also white, Wang Fucheng: Bulletin of Chinese Academy of Sciences, Vo1. 4 (2010) No. 5, pp.411-419.

Google Scholar

[3] Fok CL, Li Changhong, etc.: First International Conference on Advances in Future Internet, Vo1. 34 (2009) No. 11, pp.1608-1618.

Google Scholar

[4] Sun Qibo: Journal of Anhui University of Technology, Vo1. 23 (2010) No. 26, pp.786-793.

Google Scholar

[5] Liu Jie, Li Shan: Journal of Wuhan Institute of Technology, Vo1. 31 (2007) No. 27, pp.260-264.

Google Scholar