Abstract
In this paper, three typical definitions of cloud computing are listed. Security issues in cloud computing are analyzed. Novelties in cloud threat model, new problems and new research directions in cloud computing environment are also outlined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud/solutions/index.shtml
Michael, A., Fox, A.: Above the Clouds: A Berkley View of Cloud Computing (February 10, 2009)
The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, National Institute of Standards and Technology (NIST), Information Technology Laboratory (October 7, 2009), www.csrc.nist.gov
International Data Corporation (2009), http://blogs.idc.com/ie/wpcontent/uploads/2009/12/idc_cloud_challenges_2009.jpg
Feng, D.-G., Zhang, M., Zhang, Y., Xu, Z.: Research On Cloud Computing Security. Journal of Software 22(1), 71–82 (2011)
Onwubiko, C.: Security Issues to Cloud Computing. In: Antonopoulos, N., Gillam, L. (eds.) Cloud Computing: Principles, Systems and Applications, Computer Communications and Networks, doi:10.1007/978-1-84996-241-4_1
Biddle, R., van Oorschot, P.C., Patrick, A.S., Sobey, J., Whalen, T.: Browser interfaces and extended validation ssl certificates: an empirical study. In: Proceedings of the ACM Workshop on Cloud Computing Security, CCSW 2009 (2009)
Bowers, K.D., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009 (2009)
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the ACM Workshop on Cloud Computing Security, CCSW 2009 (2009)
A Security Analysis of Cloud Computing, http://cloudcomputing.sys-con.com/node/1203943
Amardeep Singh, Er., Monika Verma, Er.: Attacks and Security in Cloud Computing. International Journal of Advanced Engineering & Application, 300–302 (2011)
Chen, A., Paxson, V., Katz, R.H.: What’s New about Cloud Computing Security? Technical Report No. UCB/ EECS-2010-5
Monsef, M., Gidado, N.: Trust and privacy concern in the Cloud. In: 2011 European Cup, IT Security for the Next Generation (2011)
Kaufman, L.M.: Can Public-Cloud Security Meet Its Unique Challenges? IEEE Security & Privacy (July/August 2010)
Zhang, Q., Cheng, L., Boutab, R.: Cloud computing: state-of-the-art and research challenges. Internet Serv. Appl. 1, 7–18 (2010), doi:10.1007/s13174-010-0007-6
Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing, Inc., Canada, ISBN: 978-0-470-58987-8
Li, D.: www.daoliproject.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, H., Tian, X., Wei, W., Sun, C. (2012). A Deep Understanding of Cloud Computing Security. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)