원문정보
초록
영어
Cloud computing is a new computing paradigm that attracted many computer users. Among these are big companies, small and big enterprise, agencies and individual users. Cloud computing brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet. With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. It will basically cut down the expenses of the company allotted for the maintenance of the computer system. Along with the good benefits of Cloud Computing has to offer, there are security problems which make users anxious about the safety, reliability and efficiency of migrating to cloud computing. In this paper, the authors tried to study the threats and attacks that possibly launch in cloud computing and the possible solutions to mitigate these attacks. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side.
목차
1. Introduction
2. Layers of Cloud Computing Model
3. Cloud Computing Attacks
4. Security Issues
4.1 Security Analysis
5. Access Control
6. Authentications and ID Management
7. Conclusion
Acknowledgments
References