Cloud computing security analysis: Challenges and possible solutions

Author(s):  
Chandan Prakash ◽  
Surajit Dasgupta
2013 ◽  
Vol 709 ◽  
pp. 646-649
Author(s):  
Chao Wang ◽  
Hai Peng Qu ◽  
Zhao Yong Sheng

With the popularity of the research and use of cloud computing, the use and understanding of cloud computing become deeper and deeper, therefore, people's attention and exploration has been sparked by the importance of cloud computing security. This article mainly analyzes the cloud computing security of Hadoop environment, and studies the factors which affect the security of cloud computing, starting from a specific environment. Finally, this paper puts forward an improved Deterministic Packet Marking (DPM) algorithm to improve the security of cloud computing from the aspect of the network.


Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.


2020 ◽  
Vol 33 (3) ◽  
pp. 133
Author(s):  
Deepak Garg ◽  
Jagpreet Sidhu ◽  
Shalli Rani

Author(s):  
Abdulhafid Bughari Abdulkarim Abdulgadr ◽  
Abdullah Khalifa Mohamed Hamad ◽  
Mansour Khalifa Hamad Mohamed

Sign in / Sign up

Export Citation Format

Share Document