Abstract
Cloud computing is one of the key current issues in the IT industry. Concern over the security of cloud computing has particularly been the subject of continuous disputes. Such security issues have magnified because of the attribute of cloud computing. This paper will observe the security issues according to the attribute of cloud computing and introduce which countermeasures are needed to strengthen the security which is the key problem that impedes the adoption of cloud computing.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2011-0026023)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
http://www.computerweekly.com/news/2240089111/Top-five-cloud-computing-security-issues
NIST SP 800-145, The NIST Definition of Cloud Computing (November 2011)
NIST SP 800-144, Guidelines on Security and Privacy in Public Cloud Computing (December 2011)
Winkler, V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress, Waltham (2011) ISBN 978-1-59749-592-9
Are security issues delaying adoption of cloud computing? Network World (August 2010), http://www.networkworld.com/news/2009/042709-burning-security-cloud-computing.html
http://www.zdnet.com/blog/btl/amazons-web-services-outage-end-of-cloud-innocence/47731
Rosenblum, M., Garfinkel, T.: Vritual Machine Monitors: Current Technology and Future Trends. IEEE Computer Society (May 2005)
http://www.cisco.com/en/US/products/hw/switches/ps708/products_white_paper09186a008013159f.shtml
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H., Kim, J., Lee, Y., Won, D. (2012). Security Issues and Threats According to the Attribute of Cloud Computing. In: Kim, Th., et al. Computer Applications for Security, Control and System Engineering. Communications in Computer and Information Science, vol 339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35264-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-35264-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35263-8
Online ISBN: 978-3-642-35264-5
eBook Packages: Computer ScienceComputer Science (R0)