원문정보
초록
영어
Cloud computing has a lot of security issues that are gaining great attention nowadays, including the data protection, network security, virtualization security, application integrity, and identity management. Data protection is one of the most important security issues, because organizations won’t transfer its data to remote machines if there is no guaranteed data protection from the cloud service providers. Many techniques are suggested for data protection in cloud computing, but there are still a lot of challenges in this subject. The most popular security techniques include SSL (Secure Socket Layer) Encryption, Intrusion Detection System; Multi Tenancy based Access Control, etc. Goal of this paper is to analyze and evaluate the most important security techniques for data protection in cloud computing. Furthermore, security techniques for data protection will be recommended in order to have improved security in cloud computing.
목차
1. Introduction
2. Authentication in Cloud Computing
3. Confidentiality in Cloud Computing
4. Access Control in Cloud Computing
5. Authorization in Cloud Computing
6. Recommendations for Improved Data Security in Cloud Computing
6.1. Data Protection in the Cloud
6.2. Proper Usage of Administrative Privileges
6.3. Wireless Access Control of the Data
6.4. Data Recovery in Cloud Computing
6.5. Boundary Defense of the Data in the Cloud
7. Conclusion
References
