Security Challenges for the Public Cloud

被引:551
作者
Ren, Kui [1 ]
Wang, Cong [1 ]
Wang, Qian [1 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
基金
美国国家科学基金会;
关键词
cloud computing; privacy; security; trust;
D O I
10.1109/MIC.2012.14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and motivate further investigation of security solutions for a trustworthy public cloud environment.
引用
收藏
页码:69 / 73
页数:5
相关论文
共 10 条
[1]  
[Anonymous], 2009, SEC GUID CRIT AR FOC
[2]  
Bowers KD, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P501
[3]   Proofs of Ownership in Remote Storage Systems [J].
Halevi, Shai ;
Harnik, Danny ;
Pinkas, Benny ;
shulman-peleg, Alexandra .
PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, :491-500
[4]  
Mei Liu, 2010, Proceedings 2010 30th International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), P82, DOI 10.1109/ICDCSW.2010.40
[5]  
Mell P., 2011, NIST DEFINITION CLOU, P7
[6]  
Ristenpart T, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P199
[7]  
Wang C., 2010, P 30 IEEE INT C COMP, P525
[8]  
Wang C, 2011, IEEE INFOCOM SER, P820, DOI 10.1109/INFCOM.2011.5935305
[9]  
Wang R, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P338
[10]   Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [J].
Yu, Shucheng ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
2010 PROCEEDINGS IEEE INFOCOM, 2010,