Click here to load reader

雲 端運 算 的安全 注意事項 Cloud Computing Security Considerations

  • Upload
    odeda

  • View
    66

  • Download
    2

Embed Size (px)

DESCRIPTION

雲 端運 算 的安全 注意事項 Cloud Computing Security Considerations. - PowerPoint PPT Presentation

Citation preview

Research on cloud computing security problem and strategy

This paper appears in:Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference onDate of Conference: 14-16 Sept. 2011Author(s): Alok Tripathi. Abhinav Mishra. IT Div., Gorakhpur Centre, Gorakhpur, India Product Type: Conference Publications

Cloud Computing Security ConsiderationsAbstract()Introduction()Related Work()Security Threats Present In The Cloud And Their Mitigation()Secure Cloud Architecture()Conclusion()

Keywords- Cloud Computing,Security,Internet based Services,Secure Cloud Architecture

IT1.2.3.

A. VM-Level attacks (VM-)B. Abuse and Nefarious use of cloud computing()C. Lock-IN()D. Insecure Interfaces and APIs(API)

E. Data loss or leakage()F. Account or service Hijacking()G. Management Interface Compromise()H. Malicious Insiders()A. VM-Level attacks (VM-)

VMwareVirtual PCcodingIDSIPSVMB. Abuse and Nefarious use of cloud computing()

C. Lock-IN()

APID. Insecure Interfaces and APIs(API)

APIIDAPIE. Data loss or leakage()

F. Account or service Hijacking()

G. Management Interface Compromise()

WebWebH. Malicious Insiders()

A. Single Sign-On()B. Increase Availability()C. Defense in Depth Approach()D. Single Management Console()E. Virtual Machine Protection()A. Single Sign-On()

B. Increase Availability()

ISPC. Defense in Depth Approach()

SSLIPSD. Single Management Console()

E. Virtual Machine Protection()

IPSecSSL VPN