雲 端運 算 的安全 注意事項 cloud computing security considerations
Post on 20-Jan-2016
62 Views
Preview:
DESCRIPTION
TRANSCRIPT
Research on cloud computing security problem and strategy
This paper appears in:Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference onDate of Conference: 14-16 Sept. 2011Author(s): Alok Tripathi. Abhinav Mishra. IT Div., Gorakhpur Centre, Gorakhpur, India Product Type: Conference Publications
Cloud Computing Security ConsiderationsAbstract()Introduction()Related Work()Security Threats Present In The Cloud And Their Mitigation()Secure Cloud Architecture()Conclusion()
Keywords- Cloud Computing,Security,Internet based Services,Secure Cloud Architecture
IT1.2.3.
A. VM-Level attacks (VM-)B. Abuse and Nefarious use of cloud computing()C. Lock-IN()D. Insecure Interfaces and APIs(API)
E. Data loss or leakage()F. Account or service Hijacking()G. Management Interface Compromise()H. Malicious Insiders()A. VM-Level attacks (VM-)
VMwareVirtual PCcodingIDSIPSVMB. Abuse and Nefarious use of cloud computing()
C. Lock-IN()
APID. Insecure Interfaces and APIs(API)
APIIDAPIE. Data loss or leakage()
F. Account or service Hijacking()
G. Management Interface Compromise()
WebWebH. Malicious Insiders()
A. Single Sign-On()B. Increase Availability()C. Defense in Depth Approach()D. Single Management Console()E. Virtual Machine Protection()A. Single Sign-On()
B. Increase Availability()
ISPC. Defense in Depth Approach()
SSLIPSD. Single Management Console()
E. Virtual Machine Protection()
IPSecSSL VPN
top related