Research of the Issues Based on Trusted Cloud Security

Article Preview

Abstract:

Cloud computing represents one of the most significant shifts in information technology many of us are likely to see in our lifetimes. It offers an innovative business model for organizations to adopt IT services without upfront investment. Cloud computing moves the application software and databases to large data centers, where the management of the data and services may not be fully trustworthy. Security is one of the major issues which hamper the growth of cloud. The security for cloud computing is emerging area for study and this paper provide technical components of cloud computing and security idea in terms of cloud computing based on analysis of cloud security treats.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

5000-5003

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] P. Mell and T. Grance. NIST definition of cloud computing. National Institute of Standards and Technology. October 7, (2009).

Google Scholar

[2] Kuyoro S. O., Ibikunle F. , and Awodele O. Cloud Computing Security Issues and Challenges, International Journal of Computer Networks, Volume (3) : Issue (5) : (2011) : pp.247-255.

Google Scholar

[3] Rahul Bhatnagar, Suyash Raizada, and Pramod Saxena. Security in Cloud Computing, International Journal for Technological Research in Engineering, Volume 1, Issue 4, December (2013): pp.2347-4718.

Google Scholar

[4] Krutz, Ronald L., and Russell Dean Vines. Cloud Computing Security Architecture., Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Indianapolis, IN: Wiley, 2010. 179-80.

Google Scholar

[5] T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual Machine-Based Platform for Trusted Computing. In Proc. of SOSP'03, (2003).

DOI: 10.1145/945445.945464

Google Scholar

[6] TCG. https: /www. trustedcomputinggroup. org, (2014).

Google Scholar

[7] Yi. Huang and Xinqiang Ma. An access control model based on Trusted Computing (In Chinese), Journal of Chongqing University of Arts and Sciences, (2010), 29(3): pp.54-57.

Google Scholar

[8] Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues, Towards Trusted Cloud Computing, MPI-SWS, (2013).

Google Scholar