{"title":"迈向高效、安全的云","authors":"Tarek Radwan, Marianne A. Azer, Nashwa Abdelbaki","doi":"10.1109/ICACC.2013.34","DOIUrl":null,"url":null,"abstract":"Cloud computing is becoming more and more popular. It is increasing in popularity with companies as it enables them to share various resources in a cost effective way. Cloud computing has lots of advantages, however some issues need to be handled before organizations and individuals have the confidence to rely on it. Security and privacy are at the forefront of these important issues. In this paper, the evolution of cloud computing along with its deployment and delivery models are highlighted. Also, the difference between cloud computing and other deployment models are discussed. We present different security threats and propose some countermeasures. In addition, we discuss cloud computing security trends.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Towards Efficient and Secure Cloud\",\"authors\":\"Tarek Radwan, Marianne A. Azer, Nashwa Abdelbaki\",\"doi\":\"10.1109/ICACC.2013.34\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is becoming more and more popular. It is increasing in popularity with companies as it enables them to share various resources in a cost effective way. Cloud computing has lots of advantages, however some issues need to be handled before organizations and individuals have the confidence to rely on it. Security and privacy are at the forefront of these important issues. In this paper, the evolution of cloud computing along with its deployment and delivery models are highlighted. Also, the difference between cloud computing and other deployment models are discussed. We present different security threats and propose some countermeasures. In addition, we discuss cloud computing security trends.\",\"PeriodicalId\":109537,\"journal\":{\"name\":\"2013 Third International Conference on Advances in Computing and Communications\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Third International Conference on Advances in Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACC.2013.34\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third International Conference on Advances in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACC.2013.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud computing is becoming more and more popular. It is increasing in popularity with companies as it enables them to share various resources in a cost effective way. Cloud computing has lots of advantages, however some issues need to be handled before organizations and individuals have the confidence to rely on it. Security and privacy are at the forefront of these important issues. In this paper, the evolution of cloud computing along with its deployment and delivery models are highlighted. Also, the difference between cloud computing and other deployment models are discussed. We present different security threats and propose some countermeasures. In addition, we discuss cloud computing security trends.