Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)

Research on Key Security Strategies of Cloud Computing

Authors
Duanyang Zhao, Qingxiang Xu, Xiaxia Hu
Corresponding Author
Duanyang Zhao
Available Online May 2014.
DOI
10.2991/iccia.2012.392How to use a DOI?
Keywords
Cloud Computing, Data Security, Privacy Protection, Security Strategy
Abstract

More and more organizations and individuals outsource their storage and computing business into cloud computing, which is a representation of a movement towards the intensive, large scale specialization and economy. Cloud computing brings about convenience and efficiency, but challenges in the areas of data security and privacy protection. This paper identifies the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing, and to know about critical analysis about the different security models and tools proposed. Key security strategies from the infrastructure, operation and security incident response relieve the common security issues of cloud computing.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
Series
Advances in Intelligent Systems Research
Publication Date
May 2014
ISBN
978-94-91216-41-1
ISSN
1951-6851
DOI
10.2991/iccia.2012.392How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Duanyang Zhao
AU  - Qingxiang Xu
AU  - Xiaxia Hu
PY  - 2014/05
DA  - 2014/05
TI  - Research on Key Security Strategies of Cloud Computing
BT  - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
PB  - Atlantis Press
SP  - 1577
EP  - 1580
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccia.2012.392
DO  - 10.2991/iccia.2012.392
ID  - Zhao2014/05
ER  -