会议专题

Research on Key Security Strategies of Cloud Computing

  More and more organizations and individuals outsouree their storage and computing business into cloud computing,which is a representation of a movement towards the intensive,large scale specialization and economy.Cloud computing brings about convenience and efficiency,but challenges in the areas of data security and privacy protection.This paper identifies the most vulnerable security threats in cloud computing,which will enable both end users and vendors to know about the key security threats associated with cloud computing,and to know about critical analysis about the different security models and tools proposed.Key security strategies from the infrastructure,operation and security incident response relieve the common security issues of cloud computing.

Cloud Computing Data Security Privacy Protection Security Strategy

Duanyang Zhao Qingxiang Xu Xiaxia Hu

Zhijiang College of Zhejiang University of Technology, Hangzhou 310024, China

国际会议

2012 2nd International Conference on Computer and Information Applications(ICCIA2012)(2012第二届计算机和信息应用国际会议)

太原

英文

1577-1580

2012-12-08(万方平台首次上网日期,不代表论文的发表时间)