Review of cloud computing security

54Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the development of cloud computing in the academia and industry, it is inevitable that many security problems arise. This paper summarizes the security requirements of cloud computing, which not only cover the traditional security requirements like confidentiality, data integrity, access control and identity authentication, but also introduce new security requirements in the credibility, configuration and virtual machinery. We make conclusions about the security situations on two typical cloud computing products: Amazon Web Services and Windows Azure and elaborate two attack mechanisms against cloud computing: Denial of service attack and Side channel attack. Based on the security requirements and attacks against cloud computing, we systematically summarize the current security protection mechanisms and further make a comparison among them.

Cite

CITATION STYLE

APA

Yu, N. H., Hao, Z., Xu, J. J., Zhang, W. M., & Zhang, C. (2013, February). Review of cloud computing security. Tien Tzu Hsueh Pao/Acta Electronica Sinica. https://doi.org/10.3969/j.issn.0372-2112.2013.02.026

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free