Skip to main content

Research on Cloud Computing Security Problems and Protection Countermeasures

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Included in the following conference series:

Abstract

In recent years, the Chinese government has attached great importance to the development and application of cloud computing industry, and issued a series of policies to encourage and regulate the development of cloud computing. The widespread use of cloud computing brings us both opportunities and challenges. This article will from the overview of cloud computing, the narrative model and characteristics, combined with the development of cloud computing and the basic structure, analysis of the main safety problems of cloud computing, it puts forward the model of elastic cloud security system, and puts forward some protective measures, so as to improve the security of cloud computing, cloud computing security applications, facilitating the orderly development of the role, in response to a cloud computing security issues and risks emerge in endlessly.

Supported by organization x.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Congdong, L., Gang, Q., Tao, C.: A cloud computing security model based on noninterference. Wuhan Univ. J. Nat. Sci. 03, 1–7 (2019)

    MATH  Google Scholar 

  2. Hafiz Gulfam, A., Zeeshan, A.: Current cloud computing security concerns from consumer perspective. Mach. Tools Hydraul. 41(24), 1–5 (2013)

    Google Scholar 

  3. Chunming, W., Qianjun, L., Yuwei, L., Qiumei, C., Haifeng, Z.: A survey on cloud security. ZTE Commun. 15(02), 42–47 (2017)

    Google Scholar 

  4. Shengli, Z., Lifa, W., Canghong, J.: A privacy-based SLA violation detection model for the security of cloud computing. Chin. Commun. 14(09), 155–165 (2017)

    Article  Google Scholar 

  5. Xiaoming, Y., et al.: An anomalous behavior detection model in cloud computing. Tsinghua Sci. Technol. 21(03), 322–332 (2016)

    Article  Google Scholar 

  6. Wen-Lung, S.: An evolution, present, and future changes of cloud computing services. J. Electron. Sci. Technol. 13(01), 54–59 (2015)

    Google Scholar 

  7. Chuanlong, L., Jing, G.: Model of security evaluation of infrastructure as a service layer of cloud computing system. J. Donghua Univ. (Engl. Ed.) 32(02), 323–327 (2015)

    Google Scholar 

  8. Wen-Lung, S., Chao-Ming, H.: A unified framework of the cloud computing service model. J. Electron. Sci. Technol. 11(02), 150–160 (2013)

    Google Scholar 

  9. Feng, D., Zhang, M., Zhang, Y., Xu, Z.: Cloud computing security research. J. Softw. 22, 71–82 (2011)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported in part by the Beijing Great Wall Scholars’ Program under Grant CIT and TCD20170317, in part by the Beijing Tongzhou Canal Plan “Leading Talent Plan”, in part by the Beijing Collaborative Innovation Center and in part by the Management Science and Engineering High-precision Project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiani Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, X., Yao, J., Cao, N. (2019). Research on Cloud Computing Security Problems and Protection Countermeasures. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics