Abstract
In recent years, the Chinese government has attached great importance to the development and application of cloud computing industry, and issued a series of policies to encourage and regulate the development of cloud computing. The widespread use of cloud computing brings us both opportunities and challenges. This article will from the overview of cloud computing, the narrative model and characteristics, combined with the development of cloud computing and the basic structure, analysis of the main safety problems of cloud computing, it puts forward the model of elastic cloud security system, and puts forward some protective measures, so as to improve the security of cloud computing, cloud computing security applications, facilitating the orderly development of the role, in response to a cloud computing security issues and risks emerge in endlessly.
Supported by organization x.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Congdong, L., Gang, Q., Tao, C.: A cloud computing security model based on noninterference. Wuhan Univ. J. Nat. Sci. 03, 1–7 (2019)
Hafiz Gulfam, A., Zeeshan, A.: Current cloud computing security concerns from consumer perspective. Mach. Tools Hydraul. 41(24), 1–5 (2013)
Chunming, W., Qianjun, L., Yuwei, L., Qiumei, C., Haifeng, Z.: A survey on cloud security. ZTE Commun. 15(02), 42–47 (2017)
Shengli, Z., Lifa, W., Canghong, J.: A privacy-based SLA violation detection model for the security of cloud computing. Chin. Commun. 14(09), 155–165 (2017)
Xiaoming, Y., et al.: An anomalous behavior detection model in cloud computing. Tsinghua Sci. Technol. 21(03), 322–332 (2016)
Wen-Lung, S.: An evolution, present, and future changes of cloud computing services. J. Electron. Sci. Technol. 13(01), 54–59 (2015)
Chuanlong, L., Jing, G.: Model of security evaluation of infrastructure as a service layer of cloud computing system. J. Donghua Univ. (Engl. Ed.) 32(02), 323–327 (2015)
Wen-Lung, S., Chao-Ming, H.: A unified framework of the cloud computing service model. J. Electron. Sci. Technol. 11(02), 150–160 (2013)
Feng, D., Zhang, M., Zhang, Y., Xu, Z.: Cloud computing security research. J. Softw. 22, 71–82 (2011)
Acknowledgement
This work was supported in part by the Beijing Great Wall Scholars’ Program under Grant CIT and TCD20170317, in part by the Beijing Tongzhou Canal Plan “Leading Talent Plan”, in part by the Beijing Collaborative Innovation Center and in part by the Management Science and Engineering High-precision Project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Fan, X., Yao, J., Cao, N. (2019). Research on Cloud Computing Security Problems and Protection Countermeasures. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_44
Download citation
DOI: https://doi.org/10.1007/978-3-030-37337-5_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37336-8
Online ISBN: 978-3-030-37337-5
eBook Packages: Computer ScienceComputer Science (R0)