A taxonomy and survey of Cloud computing

H. K. Idrissi, A. Kartit, M. E. Marraki
{"title":"A taxonomy and survey of Cloud computing","authors":"H. K. Idrissi, A. Kartit, M. E. Marraki","doi":"10.1109/JNS3.2013.6595470","DOIUrl":null,"url":null,"abstract":"The Cloud computing arises as a new standard proprietor for providing services over internet. It is delivering several facilities to business managers by its agile infrastructure. Cloud architectures are gainful and capable to ensure the interactions, storage and computation within upcoming applications. This architecture can be used for business, scientific computing and multiple other demanding applications. The diversity of services provided by the cloud infrastructure increases their vulnerability to security incidents and attacks. In fact, security components such as confidentiality, privacy, authentication and availability must be respected when designing or deploying a cloud solution. The cloud is certainly an instrument for optimization but the research in this area has just taken its first impulse and it yet to be mature. This paper aims to provide a best understanding of cloud computing aspects and explore directions for research and technological trends in order to use and implement cloud infrastructure networks. The basic concepts of cloud computer security will be also explored, including cloud security services, principles and security requirements.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"45","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 National Security Days (JNS3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS3.2013.6595470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 45

Abstract

The Cloud computing arises as a new standard proprietor for providing services over internet. It is delivering several facilities to business managers by its agile infrastructure. Cloud architectures are gainful and capable to ensure the interactions, storage and computation within upcoming applications. This architecture can be used for business, scientific computing and multiple other demanding applications. The diversity of services provided by the cloud infrastructure increases their vulnerability to security incidents and attacks. In fact, security components such as confidentiality, privacy, authentication and availability must be respected when designing or deploying a cloud solution. The cloud is certainly an instrument for optimization but the research in this area has just taken its first impulse and it yet to be mature. This paper aims to provide a best understanding of cloud computing aspects and explore directions for research and technological trends in order to use and implement cloud infrastructure networks. The basic concepts of cloud computer security will be also explored, including cloud security services, principles and security requirements.
云计算的分类和概览
云计算作为在互联网上提供服务的新标准所有者而出现。它通过其敏捷基础设施向业务经理交付了几个工具。云架构是有益的,能够确保未来应用程序中的交互、存储和计算。这种体系结构可用于商业、科学计算和多种其他要求很高的应用程序。云基础设施提供的服务的多样性增加了它们面对安全事件和攻击的脆弱性。事实上,在设计或部署云解决方案时,必须考虑机密性、隐私性、身份验证和可用性等安全组件。云当然是一种优化工具,但这一领域的研究刚刚起步,尚未成熟。本文旨在提供对云计算方面的最佳理解,并探索研究方向和技术趋势,以便使用和实施云基础设施网络。还将探讨云计算机安全的基本概念,包括云安全服务、原理和安全要求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信