首页    期刊浏览 2025年07月08日 星期二
登录注册

文章基本信息

  • 标题:Cloud Computing Security, Defense In Depth Detailed Survey
  • 本地全文:下载
  • 作者:Ajitabh Mahalkari ; Avni Tailor ; Aniket Shukla
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2016
  • 卷号:7
  • 期号:3
  • 页码:1145-1151
  • 出版社:TechScience Publications
  • 摘要:Cloud computing is an entirely new approach of computing that offers a non-traditional, but, shared computing paradigm for organizations and individuals. It provides a way to adopt information Technology and its features without huge expenditure on infrastructure and applications. Cloud computing provides multiple on-demand services accessible from a broad network with the ease of scalability even in shared environment so to achieve cost effectiveness.However, despite the potential gains of cloud computing, security of an open access and shared environment is still a question mark, which directly impact cloud adoptions. Deploying data and business applications to a third party, security and privacy becomes critical concerns. Cloud computing is going to serve enterprise needs for confidentiality of the customer data and compliance, service providers have to provide intense security to ensure sensitive enterprise applications.In this paper, we surveyed a detailed analysis of the security problems and remedial solutions preferred by cloud service providers. We investigated the layered approach to security, which says that a different security, defense mechanism should be used in different vulnerable areas of the system. As a result, if some part of defense gets compromised, it reduces the risk of security breach on other parts of the system.Because there are multiple measures of security at different levels, the system will also get extra time to detect and respond to the attack will be an added advantage. It is a security solution to the complete system so it may also be called as defense in depth.
  • 关键词:Cloud Secuirty; defense in depth (DID); Services; cloud architecture; deployment models; virtualization; vulnerability;Cloud service provider(CSP).
国家哲学社会科学文献中心版权所有