Top Banner

Click here to load reader

of 24

雲 端運 算 的安全 注意事項 Cloud Computing Security Considerations

Jan 20, 2016

Download

Documents

odeda

雲 端運 算 的安全 注意事項 Cloud Computing Security Considerations. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

Research on cloud computing security problem and strategy

This paper appears in:Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference onDate of Conference: 14-16 Sept. 2011Author(s): Alok Tripathi. Abhinav Mishra. IT Div., Gorakhpur Centre, Gorakhpur, India Product Type: Conference Publications

Cloud Computing Security ConsiderationsAbstract()Introduction()Related Work()Security Threats Present In The Cloud And Their Mitigation()Secure Cloud Architecture()Conclusion()

Keywords- Cloud Computing,Security,Internet based Services,Secure Cloud Architecture

IT1.2.3.

A. VM-Level attacks (VM-)B. Abuse and Nefarious use of cloud computing()C. Lock-IN()D. Insecure Interfaces and APIs(API)

E. Data loss or leakage()F. Account or service Hijacking()G. Management Interface Compromise()H. Malicious Insiders()A. VM-Level attacks (VM-)

VMwareVirtual PCcodingIDSIPSVMB. Abuse and Nefarious use of cloud computing()

C. Lock-IN()

APID. Insecure Interfaces and APIs(API)

APIIDAPIE. Data loss or leakage()

F. Account or service Hijacking()

G. Management Interface Compromise()

WebWebH. Malicious Insiders()

A. Single Sign-On()B. Increase Availability()C. Defense in Depth Approach()D. Single Management Console()E. Virtual Machine Protection()A. Single Sign-On()

B. Increase Availability()

ISPC. Defense in Depth Approach()

SSLIPSD. Single Management Console()

E. Virtual Machine Protection()

IPSecSSL VPN