Abstract
Cloud computing is now regarded as one of social phenomenon that satisfy customers’ needs. It is possible that the customers’ needs and the primary principle of economy – gain maximum benefits from minimum investment – reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user’s environment based on the customer’s needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kimball, A., Michels-Slettvet, S., Biscigilia, C.: Cluster Computing for Web-Scale Data Processing. In: SIGCSE 2008, Portland, Oregon, pp. 116–120 (2008)
Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing
Vision, Hype, and Reliability for Delivering IT Services as Computing Utilities, HPCC 2008 Keynote (2008)
Thomas, D.: Enabling Application Agility-Software as a Service, Cloud Computing and Dynamic Languages. Journal of Object Technology 17(4) (May-June 2008)
Lawton, G.: Developing Software Online with Platform-as-a-Service Technology. Computer (June 2008)
Armbrust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing (February 2009), http://radlab.cs.berkeley.edu
Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2
Amazon Simple Storage Service (Amazon S3), http://aws.amazon.com/s3
Valdes, R.: Google App Engine Goes Up Against Amazon Web Services. Gartners (April 2008)
Mitchell, A.: Google Apps: Education Edition Overview Webinar, http://www.google.com
Cloud Security Alliance, http://cloudsecurityalliance.org/
Open Cloud Consortium, http://opencloudconsortium.org/
Storage Networking Industry Association, http://www.snia.org/home/
European Network & Information Security Agency (ENISA), http://www.enisa.europa.eu/
National Institute of Standards and Technology, Computer Security Resource Center, http://csrc.nist.gov/groups/SNS/cloud-computing/
Andrei, T., Jain, R.: Cloud Computing Challenges and Related Security Issues. Project report, Washington University in St. Louis (April 2009)
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Computing Alliance (December 2009)
The Role of Security in Trustworthy Cloud Computing, White Paper, RSA
Brodkin, J.: Gartner: Seven cloud-computing security risks (July 2, 2008), http://www.infoworld.com
European Network and Information Security Agency (ENISA), Cloud Computing: benefits, risks and recommendations for information security (November 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oh, T.H., Lim, S., B.Choi, Y., Park, KR., Lee, H., Choi, H. (2010). State of the Art of Network Security Perspectives in Cloud Computing. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_79
Download citation
DOI: https://doi.org/10.1007/978-3-642-16444-6_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16443-9
Online ISBN: 978-3-642-16444-6
eBook Packages: Computer ScienceComputer Science (R0)