Xianghui Zhao, Hui Liu, Jin Yi, Wen Tian, Ning Luo, Lin Ye
{"title":"Cloud Computing Service Security and Access: From the Providers and Customers' Perspective","authors":"Xianghui Zhao, Hui Liu, Jin Yi, Wen Tian, Ning Luo, Lin Ye","doi":"10.1109/ITA.2013.93","DOIUrl":null,"url":null,"abstract":"The purpose of this study is to investigate the cloud computing service security and access, by taking into account the service provider, and the customer's concerns. New trends of challenges from the two types of concerns are identified based on literature review. Especially, strategies to deal with the challenges in the mobile environment are proposed. It is expected that practitioners will be able to systematically consider the cloud provider, service provider and the customers' concern, in order to integrate as well as balance the need for cloud computing security and access.","PeriodicalId":285687,"journal":{"name":"2013 International Conference on Information Technology and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Information Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITA.2013.93","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The purpose of this study is to investigate the cloud computing service security and access, by taking into account the service provider, and the customer's concerns. New trends of challenges from the two types of concerns are identified based on literature review. Especially, strategies to deal with the challenges in the mobile environment are proposed. It is expected that practitioners will be able to systematically consider the cloud provider, service provider and the customers' concern, in order to integrate as well as balance the need for cloud computing security and access.