期刊文献+

Current Cloud Computing Security Concerns from Consumer Perspective

Current Cloud Computing Security Concerns from Consumer Perspective
下载PDF
导出
摘要 In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business.The reason behind this widespread interest is its abilityto increase the capacity and capability of enterprises,having no investment for new infrastructure,no software license requirement and no need of any training.Security concern is the main limitation factor in the growth of this new born technology.The security responsibilities of both,the provider and the consumer greatly differ between cloud service models.In this paper we discuss a variety of security risks,authentication issues,trust,and legal regularity in cloud environment with consumer perspective.Early research focused only on technical and business consequences of cloud computing and ignored consumer perspective.Therefore,this paper discusses the consumer security and privacy preferences. In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business. The reason behind this widespread interest is its abilityto increase the capacity and capability of enterprises, having no investment for new infrastructure, no software license requirement and no need of any training. Security concern is the main limitation factor in the growth of this new born technology. The security responsibilities of both, the provider and the consumer greatly differ between cloud service models. In this paper we discuss a variety of security risks, authentication issues, trust, and legal regularity in cloud environment with consumer perspective. Early research focused only on technical and business consequences of cloud computing and ignored consumer perspective. Therefore, this paper discusses the consumer security and privacy preferences.
出处 《机床与液压》 北大核心 2013年第24期1-5,共5页 Machine Tool & Hydraulics
关键词 云计算 电子商务 信息化建设 供应商 cloud computing, security issues, legal regularity
  • 相关文献

参考文献15

  • 1Noor T H, Sheng Q Z, Zeadally S. Trust Management of Services in Cloud Environments: Obstacles and Solutions [ J]. ACM Computing Surveys, 2013.
  • 2Subashini S, Kavitha V. A Survey on Security Issues in Service Delivery Models of Cloud Computing[ J ]. Journal of Network and Computer Applications,34( 1 ) :1 -11.
  • 3Gul I, Hussain M. Distributed Cloud Intrusion Detection Model [ J ]. Interuational Journal of Advanced Science and Technology,2011,34:71 - 82.
  • 4Marston S L, Zhi S, Bandyopadhyay A G. Cloud Compu- ting-The Business Perspective [ C ]//In 44th Hawaii In- ternational Conference on System Sciences, 2011 : 1 - 11.
  • 5Hwang K, Li D. Trusted Cloud Computing with Secure Resources and Data Coloring [ J ]. IEEEInternet Compu- ting. 2010(5) :14 -22.
  • 6Subashini S, Kavitha V. A servey on security issues in service delivery models of cloud computing [ J ]. Journelof Network and Computer Applications ,2011 (34).
  • 7AlZain M, Soh B, Pardede E. A New Approach Using Redundancy Technique to Improve Security in Cloud Computing[ J]. IEEE,2012.
  • 8Bracci F, Corradi A, Foschini L. Database Security Management for Healthcare SaaS in the Amazon AWS cloud[ J]. IEEE. 2012.
  • 9Choudhary V. Software as a service: Implications for in- vestment in softwaredevelopment [ J ]. International con- ference on system sciences, 2007.
  • 10Weis J, Alves-Foss J. Securing Database as a Service [ M]. IEEE Security and Privacy,2011 : 49 -55.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部