Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 250))

  • 1645 Accesses

Abstract

The information systems built on the basis of cloud computing is the current development trend. How to utilize the cloud technology to enhance the security and defense ability is a challenge facing the cloud users. It is also crucial for maintaining the healthy and sustainable development of cloud computing technology. This article first introduces the cloud computing security model. Then, the key security technologies of cloud platforms are briefly illustrated from four aspects: infrastructure security, virtualization security, service security, and data security. The security problems unique to cloud platform are the emphasis of this article. Moreover, the significance of virtualization security technologies, as well as the current status, realization principle, and development trend are also the main concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lin, Z., Fu, X., Wang, R., Han, Z.: Research on security challenges in cloud computing. Electron. Eng. (2009)

    Google Scholar 

  2. Intel Corporation.: Leading virtualization 2.0[EB/OL]. White Paper: Intel Virtualization Technology (Intel VT), March 28,2008

    Google Scholar 

  3. Advanced Micro Devices Inc.: Live Migration with AMD-V Extended Migration Technology[EB\OL]. April 2008

    Google Scholar 

  4. VMware Inc.: VMware Workstation 7[EB/OL],2009

    Google Scholar 

  5. Armadillo[EB/OL].: 29 March, (2010). http://www.siliconrealms.com

  6. PEiDSO EB/OL. 4, November 2007

    Google Scholar 

  7. Baliga, A., Chen, X., Iftode, L.: Paladin: Automated detection and containment of rootkit attacks[D]. Dept Comput. Sci. Rutgers University. (2006)

    Google Scholar 

  8. Bayer, U., Milani, P., Hlauschek, C., et al.: Scalable, Behavior-Based Malware Clustering[C]. 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, February,2009

    Google Scholar 

  9. Royal, P.: Alternative Medicine: The Malware Analyst’s Blue Pill. Black Hat, USA (2008)

    Google Scholar 

  10. North Security Labs.: Hypersight Rootkit Detector A New-Generation Rootkit detector EB/OL, 27 January, (2008)

    Google Scholar 

  11. Anthony Liguori.: QEMU Emulator User Documentation EB/OL. 29 January (2010)

    Google Scholar 

  12. Bayer, U.: TT Analyze A Tool for Analyzing Malware. Vienna University of Technology, Vienna (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liang Junjie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Junjie, L. (2014). Key Security Technologies of Cloud Computing Platforms. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Soft Computing Techniques and Engineering Application. Advances in Intelligent Systems and Computing, vol 250. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1695-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1695-7_47

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1694-0

  • Online ISBN: 978-81-322-1695-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics