Security and privacy in cloud computing

Sara Hamouda
{"title":"Security and privacy in cloud computing","authors":"Sara Hamouda","doi":"10.1109/ICCCTAM.2012.6488106","DOIUrl":null,"url":null,"abstract":"After decades of engineering development, Internet connectivity has become a commodity product in many countries. The rapid adoption of Web 2.0 technologies such as blogging, online media sharing, social networking, and web-based collaboration has moved enormous quantities of data onto Internet servers. Along with this migration to web services has come a push for companies to adopt utility computing. Much like traditional infrastructure utilities, such as gas and electricity, utility or cloud computing seeks to abstract the supply of computing services from concerns of everyday users. Today, security and privacy concerns may represent the biggest hazards to moving services to external clouds. With cloud computing, data is stored and delivered over the Internet. The owner of the data does not control, and typically does not even know, the location of the data. There is a real chance that the owner's data could rest on the same resources as a competitor's application and data. In this paper I focus on how to secure cloud computing in terms of security and privacy.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCTAM.2012.6488106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

After decades of engineering development, Internet connectivity has become a commodity product in many countries. The rapid adoption of Web 2.0 technologies such as blogging, online media sharing, social networking, and web-based collaboration has moved enormous quantities of data onto Internet servers. Along with this migration to web services has come a push for companies to adopt utility computing. Much like traditional infrastructure utilities, such as gas and electricity, utility or cloud computing seeks to abstract the supply of computing services from concerns of everyday users. Today, security and privacy concerns may represent the biggest hazards to moving services to external clouds. With cloud computing, data is stored and delivered over the Internet. The owner of the data does not control, and typically does not even know, the location of the data. There is a real chance that the owner's data could rest on the same resources as a competitor's application and data. In this paper I focus on how to secure cloud computing in terms of security and privacy.
云计算中的安全和隐私
经过几十年的工程发展,互联网连接在许多国家已经成为一种商品。Web 2.0技术(如博客、在线媒体共享、社交网络和基于Web的协作)的迅速采用已将大量数据转移到Internet服务器上。随着向web服务的迁移,推动公司采用效用计算。与传统的基础设施公用事业(如天然气和电力)非常相似,公用事业或云计算试图将计算服务的供应从日常用户的关注中抽象出来。今天,安全和隐私问题可能是将服务转移到外部云的最大危害。有了云计算,数据在互联网上存储和传递。数据的所有者无法控制数据的位置,通常甚至不知道数据的位置。很有可能所有者的数据与竞争对手的应用程序和数据依赖于相同的资源。在本文中,我将重点讨论如何在安全性和隐私性方面保护云计算。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信