{"title":"云计算:探索基础设施即服务中的安全设计方法","authors":"M. Jog, M. Madiajagan","doi":"10.1109/ICCCTAM.2012.6488090","DOIUrl":null,"url":null,"abstract":"Cloud computing is a new paradigm that promises to provide businesses with an IT infrastructure that is flexible, inexpensive and easy to use. Despite such promises, cloud computing has not been adopted at a pace that was expected. Among various reasons that prevent its widespread adoption, the most serious issue that Cloud Computing faces concerns its inability to insure data privacy and confidentiality. The fact that the security challenges faced by the Cloud depend on its deployment model as well as delivery model has further aggravated this problem. Hence we need to develop unique solutions to address security risks at various levels in Cloud Computing. This paper presents a survey on the various types of technologies and architectures that seek to achieve trusted cloud computing at Infrastructure as a Service (IaaS) level.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Cloud Computing: Exploring security design approaches in Infrastructure as a Service\",\"authors\":\"M. Jog, M. Madiajagan\",\"doi\":\"10.1109/ICCCTAM.2012.6488090\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a new paradigm that promises to provide businesses with an IT infrastructure that is flexible, inexpensive and easy to use. Despite such promises, cloud computing has not been adopted at a pace that was expected. Among various reasons that prevent its widespread adoption, the most serious issue that Cloud Computing faces concerns its inability to insure data privacy and confidentiality. The fact that the security challenges faced by the Cloud depend on its deployment model as well as delivery model has further aggravated this problem. Hence we need to develop unique solutions to address security risks at various levels in Cloud Computing. This paper presents a survey on the various types of technologies and architectures that seek to achieve trusted cloud computing at Infrastructure as a Service (IaaS) level.\",\"PeriodicalId\":111485,\"journal\":{\"name\":\"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCTAM.2012.6488090\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCTAM.2012.6488090","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud Computing: Exploring security design approaches in Infrastructure as a Service
Cloud computing is a new paradigm that promises to provide businesses with an IT infrastructure that is flexible, inexpensive and easy to use. Despite such promises, cloud computing has not been adopted at a pace that was expected. Among various reasons that prevent its widespread adoption, the most serious issue that Cloud Computing faces concerns its inability to insure data privacy and confidentiality. The fact that the security challenges faced by the Cloud depend on its deployment model as well as delivery model has further aggravated this problem. Hence we need to develop unique solutions to address security risks at various levels in Cloud Computing. This paper presents a survey on the various types of technologies and architectures that seek to achieve trusted cloud computing at Infrastructure as a Service (IaaS) level.