{"title":"Security Architecture of Cloud Computing","authors":"J. Rosy, D. S. Kumar","doi":"10.4018/978-1-5225-7924-3.ch001","DOIUrl":null,"url":null,"abstract":"Cloud computing is an innovation for dynamic resources to be used over the internet. Though cloud computing is cost effective and easy to use, security is often an area of concern. Sharing of sensitive information and running critical applications on public and/or shared cloud environments require high degree of security. Amount of data stored and processed is increasing enormously requiring cloud environments to resize to larger capacities. Cloud environments have both pros and cons concerning the security of data of the consumers using cloud services. This chapter discusses the main security issues faced by cloud computing environments. The main focus of this chapter is to describe the issues faced during building cross-domain collaborations over the internet and usage of cloud services and its security. This chapter also identifies the security at various levels of cloud computing and, based on cloud architecture, categorizes the security issues.","PeriodicalId":287112,"journal":{"name":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-7924-3.ch001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud computing is an innovation for dynamic resources to be used over the internet. Though cloud computing is cost effective and easy to use, security is often an area of concern. Sharing of sensitive information and running critical applications on public and/or shared cloud environments require high degree of security. Amount of data stored and processed is increasing enormously requiring cloud environments to resize to larger capacities. Cloud environments have both pros and cons concerning the security of data of the consumers using cloud services. This chapter discusses the main security issues faced by cloud computing environments. The main focus of this chapter is to describe the issues faced during building cross-domain collaborations over the internet and usage of cloud services and its security. This chapter also identifies the security at various levels of cloud computing and, based on cloud architecture, categorizes the security issues.