Abstract
The information systems built on the basis of cloud computing is the current development trend. How to utilize the cloud technology to enhance the security and defense ability is a challenge facing the cloud users. It is also crucial for maintaining the healthy and sustainable development of cloud computing technology. This article first introduces the cloud computing security model. Then, the key security technologies of cloud platforms are briefly illustrated from four aspects: infrastructure security, virtualization security, service security, and data security. The security problems unique to cloud platform are the emphasis of this article. Moreover, the significance of virtualization security technologies, as well as the current status, realization principle, and development trend are also the main concerns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lin, Z., Fu, X., Wang, R., Han, Z.: Research on security challenges in cloud computing. Electron. Eng. (2009)
Intel Corporation.: Leading virtualization 2.0[EB/OL]. White Paper: Intel Virtualization Technology (Intel VT), March 28,2008
Advanced Micro Devices Inc.: Live Migration with AMD-V Extended Migration Technology[EB\OL]. April 2008
VMware Inc.: VMware Workstation 7[EB/OL],2009
Armadillo[EB/OL].: 29 March, (2010). http://www.siliconrealms.com
PEiDSO EB/OL. 4, November 2007
Baliga, A., Chen, X., Iftode, L.: Paladin: Automated detection and containment of rootkit attacks[D]. Dept Comput. Sci. Rutgers University. (2006)
Bayer, U., Milani, P., Hlauschek, C., et al.: Scalable, Behavior-Based Malware Clustering[C]. 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, February,2009
Royal, P.: Alternative Medicine: The Malware Analyst’s Blue Pill. Black Hat, USA (2008)
North Security Labs.: Hypersight Rootkit Detector A New-Generation Rootkit detector EB/OL, 27 January, (2008)
Anthony Liguori.: QEMU Emulator User Documentation EB/OL. 29 January (2010)
Bayer, U.: TT Analyze A Tool for Analyzing Malware. Vienna University of Technology, Vienna (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Junjie, L. (2014). Key Security Technologies of Cloud Computing Platforms. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Soft Computing Techniques and Engineering Application. Advances in Intelligent Systems and Computing, vol 250. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1695-7_47
Download citation
DOI: https://doi.org/10.1007/978-81-322-1695-7_47
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1694-0
Online ISBN: 978-81-322-1695-7
eBook Packages: EngineeringEngineering (R0)