PoS - Proceedings of Science
Volume 300 - Information Science and Cloud Computing (ISCC 2017) - Sesssion III: System detection
A Study on Security Risk in Cloud Computing
L. Chen* and X. Chen
Full text: pdf
Pre-published on: February 26, 2018
Published on: March 08, 2018
Abstract
With the rapid development of the global economy and internet technology, cloud computing technology has been advanced at a rapid pace. Cloud computing technology is a new development model for large-scale computing after distributed computing, parallel computing and grid computing. In the in-depth application of cloud computing services, cloud programs continue to expand. Due to the popularity of cloud computing services, cloud service security has become an important factor affecting its application and development. Cloud computing technology will be a public resource shared among computing resources, storage resources and others; it has also led to the lack of transparency and less control of IT assets, resulting in many business concerns about data loss and destruction. At present, the main risks to cloud computing lie in sharing, insecure interfaces, privileged user visits, identity counterfeiting, data security, management and legal affairs. To reduce or eliminate the main risks of cloud computing, encryption technology is adopted, with the introduction of strict identity authentication mechanism, strengthen management and safety supervision, as well as improvement on information security laws, regulations and other countermeasures.
DOI: https://doi.org/10.22323/1.300.0032
How to cite

Metadata are provided both in "article" format (very similar to INSPIRE) as this helps creating very compact bibliographies which can be beneficial to authors and readers, and in "proceeding" format which is more detailed and complete.

Open Access
Creative Commons LicenseCopyright owned by the author(s) under the term of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.