Research on Key Security Strategies of Cloud Computing
- 10.2991/iccia.2012.392How to use a DOI?
- Cloud Computing, Data Security, Privacy Protection, Security Strategy
More and more organizations and individuals outsource their storage and computing business into cloud computing, which is a representation of a movement towards the intensive, large scale specialization and economy. Cloud computing brings about convenience and efficiency, but challenges in the areas of data security and privacy protection. This paper identifies the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing, and to know about critical analysis about the different security models and tools proposed. Key security strategies from the infrastructure, operation and security incident response relieve the common security issues of cloud computing.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Duanyang Zhao AU - Qingxiang Xu AU - Xiaxia Hu PY - 2014/05 DA - 2014/05 TI - Research on Key Security Strategies of Cloud Computing BT - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012) PB - Atlantis Press SP - 1577 EP - 1580 SN - 1951-6851 UR - https://doi.org/10.2991/iccia.2012.392 DO - 10.2991/iccia.2012.392 ID - Zhao2014/05 ER -