{"title":"云计算安全体系结构","authors":"J. Rosy, D. S. Kumar","doi":"10.4018/978-1-5225-7924-3.ch001","DOIUrl":null,"url":null,"abstract":"Cloud computing is an innovation for dynamic resources to be used over the internet. Though cloud computing is cost effective and easy to use, security is often an area of concern. Sharing of sensitive information and running critical applications on public and/or shared cloud environments require high degree of security. Amount of data stored and processed is increasing enormously requiring cloud environments to resize to larger capacities. Cloud environments have both pros and cons concerning the security of data of the consumers using cloud services. This chapter discusses the main security issues faced by cloud computing environments. The main focus of this chapter is to describe the issues faced during building cross-domain collaborations over the internet and usage of cloud services and its security. This chapter also identifies the security at various levels of cloud computing and, based on cloud architecture, categorizes the security issues.","PeriodicalId":287112,"journal":{"name":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Architecture of Cloud Computing\",\"authors\":\"J. Rosy, D. S. Kumar\",\"doi\":\"10.4018/978-1-5225-7924-3.ch001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is an innovation for dynamic resources to be used over the internet. Though cloud computing is cost effective and easy to use, security is often an area of concern. Sharing of sensitive information and running critical applications on public and/or shared cloud environments require high degree of security. Amount of data stored and processed is increasing enormously requiring cloud environments to resize to larger capacities. Cloud environments have both pros and cons concerning the security of data of the consumers using cloud services. This chapter discusses the main security issues faced by cloud computing environments. The main focus of this chapter is to describe the issues faced during building cross-domain collaborations over the internet and usage of cloud services and its security. This chapter also identifies the security at various levels of cloud computing and, based on cloud architecture, categorizes the security issues.\",\"PeriodicalId\":287112,\"journal\":{\"name\":\"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-5225-7924-3.ch001\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-7924-3.ch001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud computing is an innovation for dynamic resources to be used over the internet. Though cloud computing is cost effective and easy to use, security is often an area of concern. Sharing of sensitive information and running critical applications on public and/or shared cloud environments require high degree of security. Amount of data stored and processed is increasing enormously requiring cloud environments to resize to larger capacities. Cloud environments have both pros and cons concerning the security of data of the consumers using cloud services. This chapter discusses the main security issues faced by cloud computing environments. The main focus of this chapter is to describe the issues faced during building cross-domain collaborations over the internet and usage of cloud services and its security. This chapter also identifies the security at various levels of cloud computing and, based on cloud architecture, categorizes the security issues.