2012
DOI: 10.1007/978-3-642-35211-9_13
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Understanding of Cloud Computing Security

Abstract: Abstract. In this paper, three typical definitions of cloud computing are listed.Security issues in cloud computing are analyzed. Novelties in cloud threat model, new problems and new research directions in cloud computing environment are also outlined.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Virtualization is a core technology in cloud computing and an essential element for a cloud to achieve its characteristics, especially scalability, location independence, and resource pooling. In a virtual environment, multiple Operating Systems (OSs) run at the same time on a single host computer using a hypervisor (also called Virtual Machine Monitor (VMM)) [123], and physical servers contain multiple virtualized servers on which several virtual machine instances may be running [97,77].…”
Section: Cloud Security Issues Based On Different Layers Virtualization Level Security Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…Virtualization is a core technology in cloud computing and an essential element for a cloud to achieve its characteristics, especially scalability, location independence, and resource pooling. In a virtual environment, multiple Operating Systems (OSs) run at the same time on a single host computer using a hypervisor (also called Virtual Machine Monitor (VMM)) [123], and physical servers contain multiple virtualized servers on which several virtual machine instances may be running [97,77].…”
Section: Cloud Security Issues Based On Different Layers Virtualization Level Security Issuesmentioning
confidence: 99%
“…Moreover, it offers methods to estimate both the number and locations for the multiple change points simultaneously without a priori knowledge of them. Specifically, we use the ECP implementation of the E-divisive algorithm and call it E-Div throughout the thesis [77].…”
Section: Change Point Analysismentioning
confidence: 99%
See 1 more Smart Citation