Study on Differentiated Security Service Based on Cloud Computing

Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced...

Full description

Saved in:
Bibliographic Details
Main Authors: Dongmei Li, Shijun Yin, Jianyong Chen
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2013-03-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.03.012/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529217415643136
author Dongmei Li
Shijun Yin
Jianyong Chen
author_facet Dongmei Li
Shijun Yin
Jianyong Chen
author_sort Dongmei Li
collection DOAJ
description Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited.
format Article
id doaj-art-df40f0cc5b3c4eafa2a206acf96e1efa
institution Kabale University
issn 1000-0801
language zho
publishDate 2013-03-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-df40f0cc5b3c4eafa2a206acf96e1efa2025-01-15T03:23:12ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012013-03-0129626559629947Study on Differentiated Security Service Based on Cloud ComputingDongmei LiShijun YinJianyong ChenDep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.03.012/c1oud computingsecuritydifferentiated security
spellingShingle Dongmei Li
Shijun Yin
Jianyong Chen
Study on Differentiated Security Service Based on Cloud Computing
Dianxin kexue
c1oud computing
security
differentiated security
title Study on Differentiated Security Service Based on Cloud Computing
title_full Study on Differentiated Security Service Based on Cloud Computing
title_fullStr Study on Differentiated Security Service Based on Cloud Computing
title_full_unstemmed Study on Differentiated Security Service Based on Cloud Computing
title_short Study on Differentiated Security Service Based on Cloud Computing
title_sort study on differentiated security service based on cloud computing
topic c1oud computing
security
differentiated security
url http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.03.012/
work_keys_str_mv AT dongmeili studyondifferentiatedsecurityservicebasedoncloudcomputing
AT shijunyin studyondifferentiatedsecurityservicebasedoncloudcomputing
AT jianyongchen studyondifferentiatedsecurityservicebasedoncloudcomputing