{"title":"A taxonomy and survey of Cloud computing","authors":"H. K. Idrissi, A. Kartit, M. E. Marraki","doi":"10.1109/JNS3.2013.6595470","DOIUrl":null,"url":null,"abstract":"The Cloud computing arises as a new standard proprietor for providing services over internet. It is delivering several facilities to business managers by its agile infrastructure. Cloud architectures are gainful and capable to ensure the interactions, storage and computation within upcoming applications. This architecture can be used for business, scientific computing and multiple other demanding applications. The diversity of services provided by the cloud infrastructure increases their vulnerability to security incidents and attacks. In fact, security components such as confidentiality, privacy, authentication and availability must be respected when designing or deploying a cloud solution. The cloud is certainly an instrument for optimization but the research in this area has just taken its first impulse and it yet to be mature. This paper aims to provide a best understanding of cloud computing aspects and explore directions for research and technological trends in order to use and implement cloud infrastructure networks. The basic concepts of cloud computer security will be also explored, including cloud security services, principles and security requirements.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"45","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 National Security Days (JNS3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS3.2013.6595470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 45
Abstract
The Cloud computing arises as a new standard proprietor for providing services over internet. It is delivering several facilities to business managers by its agile infrastructure. Cloud architectures are gainful and capable to ensure the interactions, storage and computation within upcoming applications. This architecture can be used for business, scientific computing and multiple other demanding applications. The diversity of services provided by the cloud infrastructure increases their vulnerability to security incidents and attacks. In fact, security components such as confidentiality, privacy, authentication and availability must be respected when designing or deploying a cloud solution. The cloud is certainly an instrument for optimization but the research in this area has just taken its first impulse and it yet to be mature. This paper aims to provide a best understanding of cloud computing aspects and explore directions for research and technological trends in order to use and implement cloud infrastructure networks. The basic concepts of cloud computer security will be also explored, including cloud security services, principles and security requirements.