Cloud computing security

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 745

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

MOCONF05_241

تاریخ نمایه سازی: 21 شهریور 1395

Abstract:

The recent emergence of cloud computing has drastically altered everyone’s perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats

Keywords:

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • _ S tanoevska- Slabeva, T. Wozniak Grid and Cloud Computing-A ...
  • E. Naone, Technology overview, conjuring clouds, MIT Technology Review, July-August, ...
  • Merrill Lynch, The cloud war, _ billion at stake, Merrill ...
  • _ ReeseCloud Application Architectures Building Applications and Infrastructure in the ...
  • _ Rajkumar, C. Yeo, S. Venugopal, S. MalpaniCloud computing and ...
  • JD. Artz, Y. GilA survey of trust in computer science ...
  • DoD Computer Security Center, Trusted computer system evaluation criteria, DoD ...
  • _ nternational Telecommu nication Union, X-509 _ ISO/IEC 9594-8, The ...
  • O mmu1c al1ons , ن) _ LeEKKaSES tab1shng anu manag1ng ...
  • A. GiddensThe Consequences of M odernityPolity Press, UK (1991) ...
  • _ Tserpes, F. Aisopos, D. Kyriazis, T. VarvarigouS ervice selection ...
  • R. S hermanDis tributed systems S ec ur ityComputers & ...
  • D. Lekkas, S. Gritzalis, S. Kats ikasQuality assured trusted third ...
  • [LZINational Institute of Standards and Technology. Guide for mapping types ...
  • Gartner. Assessing the security risks of cloud computing, Gartner, 2008. ...
  • نمایش کامل مراجع