p.1164
p.1168
p.1175
p.1180
p.1185
p.1190
p.1194
p.1199
p.1204
Research on Key Security Strategies of Cloud Computing
Abstract:
More and more organizations and individuals outsource their storage and computing business into cloud computing, which is a representation of a movement towards the intensive, large scale specialization and economy. Cloud computing brings about convenience and efficiency, but challenges in the areas of data security and privacy protection. This paper identifies the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing, and to know about critical analysis about the different security models and tools proposed. Key security strategies from the infrastructure, operation and security incident response relieve the common security issues of cloud computing.
Info:
Periodical:
Pages:
1185-1189
Citation:
Online since:
September 2013
Authors:
Keywords:
Price:
Сopyright:
© 2013 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: