PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives

Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The security aspects of cloud computing, especially the security of data, become more and more important. It is necessary to find and develop the new mechanisms to secure the cloud. The problem presented in the paper concerns the mechanisms for security of cloud computing with special attention paid to aspects of access control in clouds – the state of the art and the perspectives for the future.
Rocznik
Strony
35--49
Opis fizyczny
Bibliogr. 24 poz., rys., tab.
Twórcy
  • Institute of Information Technology, Lodz University of Technology, Poland
Bibliografia
  • [1] Cloud computing. Encyclopedia Britannica Inc., 2012.
  • [2] Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Proceedings of Grid Computing Environments Workshop (GCE’08), pp. 1–10. 2008.
  • [3] Hausman, K., Cook, S. L., Sampaio, T.: Cloud Essentials. John Wiley and Sons, 2013.
  • [4] Ahson, S., Ilyas, M.: Cloud Computing and Software Services. Theory and Techniques. CRC Press, 2011.
  • [5] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A View of Cloud Computing. Communications of the ACM, 53, pp. 50–58, 2010.
  • [6] IBM: What is cloud? http://www.ibm.com/cloud-computing/us/en/what-is-cloud-computing.html, 2009.
  • [7] Viswanathan, P.: Cloud Computing Is it Really All That Beneficial? Advantages and Disadvantages of Cloud Computing. http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm.
  • [8] Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, Inc. New York, NY, USA, 2010.
  • [9] Grance, T., Jansen, W.: Guidelines on Security and Privacy in Public Cloud Computing. NIST, US Department of Commerce, 2011.
  • [10] Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Computer Security ESORICS 2009, LNCS, volume 5789, pp. 355–370. Springer, 2009.
  • [11] Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34, p. 111, 2011.
  • [12] Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems, 28, p. 583592, 2012.
  • [13] Krutz, R. L., Vines, R. D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing, 2010.
  • [14] Yang, K., Jia, X.: Security for Cloud Storage Systems. Springer, 2014.
  • [15] ENISA: Cloud Computing Risk Assessment. http://www.enisa.europa.eu/ activities/risk-management/files/ deliverables/ cloud-computing-risk-assessment, 2009.
  • [16] VMWare: Securing the Cloud A Review of Cloud Computing, Security Implications and Best Practices. Whitepaper, 2011.
  • [17] CloudU: The Elephant in the Room, Cloud Security and What Vendors and Customers need To Do To Stay Secure. Diversity Limited, 2011.
  • [18] Winkler, J. R. V.: Securing the Cloud. Cloud computer security techniques and tactics. Syngress, 2011.
  • [19] Cloud Computing Security – Best Practices. www.ryerson.ca/ ccs/ itsecurity/CloudComputingSecurity.
  • [20] Cloud Security Guidance. International Technical Support Organization Team, IBM Recommendations for the Implementation of Cloud Security, 2009.
  • [21] Takabi, H., Joshi, J. B. D., Ahn, G.-J.: Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, 8, pp. 24–31, 2010.
  • [22] Madavi, T. J., Gawande, Y. V., Kale, M. B.: Security in Cloud Computing. In: Proceedings of the International Conference on Advances in Computer and Management. 2012.
  • [23] Goncalves, G., Poniszewska-Maranda, A.: Role engineering: from design to evaluation of security schemas. Journal of Systems and Software, 81, pp. 1306–1326, 2008.
  • [24] Poniszewska-Maranda, A.: Modeling and design of role engineering in development of access control for dynamic information systems. Bulletin of the Polish Academy of Sciences, Technical Science, 61, pp. 569–580, 2013.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-0291d9d6-3f49-4ab8-8534-c4f08d8ed3be
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.