Research on Key Security Strategies of Cloud Computing

Article Preview

Abstract:

More and more organizations and individuals outsource their storage and computing business into cloud computing, which is a representation of a movement towards the intensive, large scale specialization and economy. Cloud computing brings about convenience and efficiency, but challenges in the areas of data security and privacy protection. This paper identifies the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing, and to know about critical analysis about the different security models and tools proposed. Key security strategies from the infrastructure, operation and security incident response relieve the common security issues of cloud computing.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1185-1189

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Cloud Security Alliance. Top Threats to Cloud Computing, Version 1. 0 (2010). Retrieved October 15, 2009, from https: /cloudsecurityalliance. org/topthreats.

Google Scholar

[2] Huiming Yu, Nakia Powell, Dexter Stembridge, Xiaohong Yuan, Cloud Computing and Security Challenges. In proceedings of the 50th Annual Southeast Regional Conference. (2012) March 29, Bryant, Tuscaloosa.

DOI: 10.1145/2184512.2184581

Google Scholar

[3] Craig A. Lee. A Perspective on Scientific Cloud Computing, In proceedings of the 19th ACM International Symposium on High Performance Distributed Computing. (2010) June 20, New York, USA.

DOI: 10.1145/1851476.1851542

Google Scholar

[4] Kamal Dahbur, Bassil Mohammad, Ahmad Bisher Tarakji. A Survey of Risks, Threats and Vulnerabilities in Cloud Computing, In proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications. (2011).

DOI: 10.1145/1980822.1980834

Google Scholar

[5] P. Mell, T. Grance. The NIST definition of cloud computing. National Institute of Standards and Technology. Special Publication 800-145. September 2011. Gaithersburg, USA.

Google Scholar

[6] Yi Wei, M. B. Blake, Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. IEEE Internet Computing. 14, 6 (2010).

DOI: 10.1109/mic.2010.147

Google Scholar

[7] Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud security and privacy, O'Reilly Media, Sebastopol, CA (2009).

Google Scholar

[8] David Teneyuca, Internet cloud security: The illusion of inclusion, Information Security Technical Report. 102, 10(2011).

DOI: 10.1016/j.istr.2011.08.005

Google Scholar

[9] Feng Dengguo, Zhang Min, Zhang Yan, etc. Study on Cloud Computing Security. Journal of Software, 2011, 22(1): 1−83.

Google Scholar

[10] Yang Jian,Wang Haihang,Wang Jian. Survey on Some Security Issues of Cloud Computing. Journal of Chinese Computer Systems, 2012, 33(3): 42-49.

Google Scholar