Cloud Computing: Cloud Security to Trusted Cloud

Article Preview

Abstract:

Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..

You might also be interested in these eBooks

Info:

Periodical:

Pages:

596-600

Citation:

Online since:

January 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Luis M. Vaquero, Luis Rodero-Merino and Juan Caceres, et al. A Break in the Clouds: Towards a Cloud Definition, ACM SIGCOMM Computer Communication Review, 39(1): 50-55, (2009).

DOI: 10.1145/1496091.1496100

Google Scholar

[2] Open Cloud Manifesto. Retrieved from http: /www. opencloudmanifesto. org, (2010).

Google Scholar

[3] Neal Leavitt. Is Cloud Computing Really Ready for Prime Time?. IEEE Computer, 2009, (1): 15-20.

DOI: 10.1109/mc.2009.20

Google Scholar

[4] Michael Armbrust, Armando Fox and Rean Griffith, et al. Above the Clouds: A Berkeley View of Cloud Computing, (2009).

Google Scholar

[5] CCW Research. 2009 White Paper on China Cloud Computing Development. Retrieved from http: /www. tsinghuausa. org/W0509web/id0509/yun. pdf, (2010).

Google Scholar

[6] Kevin D. Bowers, Ari Juels, and Alina Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. Cryptology ePrint Archive, Report 2008/489.

DOI: 10.1145/1653662.1653686

Google Scholar

[7] Gartner. Teleworking in the Cloud: Security Risks and Remedies, (2010).

Google Scholar

[8] Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing. Retrieved from http: /www. cloudsecurityalliance. org/guidance/csaguide. pdf , (2010).

Google Scholar

[9] SUN. Introduction to Cloud Computing architecture White Paper (1st Edition), 2010. Retrieved from https: /dct. sun. com/dct/, (2010).

Google Scholar

[10] IBM. Prospects for new security technology. Retrieved from http: /www-935. ibm. com/services/cn/gts/pdf/ibm-tendency. pdf, (2010).

Google Scholar

[11] Clavister. Security in the Cloud Clavister White Paper. Retrieved from http: /www. clavister. com/pdf/clavister-whp-security_in_the_cloud. pdf, (2009).

Google Scholar

[12] Elisa Bertino, Federica Paci, Rodolfo Ferrini. Privacy-preserving Digital Identity Management for Cloud Computing. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009, 32(1): 21-27.

Google Scholar

[13] Mao Wen-Bo. Cloud computing security, 2009. Retrieved from http: /blog. pconline. com. cn/article/334526. html, (2010).

Google Scholar

[14] Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues. Towards Trusted Cloud Computing Retrieved from http: /www. mpi-sws. org/~gummadi/papers/trusted_cloud. pdf, (2010).

Google Scholar

[15] Haibo Chen. Improving the Dependability of Cloud Computing Systems, Fudan University PhD thesis, (2009).

Google Scholar

[16] Jin Hai. Computing system virtualization: Principles and Applications, China Tsinghua University Press, (2008).

Google Scholar