State of the art of network security perspectives in cloud computing

Tae Hwan Oh, Shinyoung Lim, Young B. Choi, Kwang Roh Park, Heejo Lee, Hyunsang Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

Original languageEnglish
Title of host publicationCommunications in Computer and Information Science
Pages629-637
Number of pages9
Volume78 CCIS
DOIs
Publication statusPublished - 2010 Nov 9
Event1st International Conference on Security-Enriched Urban Computing and Smart Grid, SUComS 2010 - Daejeon, Korea, Republic of
Duration: 2010 Sep 152010 Sep 17

Publication series

NameCommunications in Computer and Information Science
Volume78 CCIS
ISSN (Print)18650929

Other

Other1st International Conference on Security-Enriched Urban Computing and Smart Grid, SUComS 2010
CountryKorea, Republic of
CityDaejeon
Period10/9/1510/9/17

Fingerprint

Network security
Cloud computing
Application programs
Internet
Outsourcing
Software packages
Computer systems

Keywords

  • Cloud computing
  • cloud security guidance
  • network security
  • risk analysis

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Oh, T. H., Lim, S., Choi, Y. B., Park, K. R., Lee, H., & Choi, H. (2010). State of the art of network security perspectives in cloud computing. In Communications in Computer and Information Science (Vol. 78 CCIS, pp. 629-637). (Communications in Computer and Information Science; Vol. 78 CCIS). https://doi.org/10.1007/978-3-642-16444-6_79

State of the art of network security perspectives in cloud computing. / Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang Roh; Lee, Heejo; Choi, Hyunsang.

Communications in Computer and Information Science. Vol. 78 CCIS 2010. p. 629-637 (Communications in Computer and Information Science; Vol. 78 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Oh, TH, Lim, S, Choi, YB, Park, KR, Lee, H & Choi, H 2010, State of the art of network security perspectives in cloud computing. in Communications in Computer and Information Science. vol. 78 CCIS, Communications in Computer and Information Science, vol. 78 CCIS, pp. 629-637, 1st International Conference on Security-Enriched Urban Computing and Smart Grid, SUComS 2010, Daejeon, Korea, Republic of, 10/9/15. https://doi.org/10.1007/978-3-642-16444-6_79
Oh TH, Lim S, Choi YB, Park KR, Lee H, Choi H. State of the art of network security perspectives in cloud computing. In Communications in Computer and Information Science. Vol. 78 CCIS. 2010. p. 629-637. (Communications in Computer and Information Science). https://doi.org/10.1007/978-3-642-16444-6_79
Oh, Tae Hwan ; Lim, Shinyoung ; Choi, Young B. ; Park, Kwang Roh ; Lee, Heejo ; Choi, Hyunsang. / State of the art of network security perspectives in cloud computing. Communications in Computer and Information Science. Vol. 78 CCIS 2010. pp. 629-637 (Communications in Computer and Information Science).
@inproceedings{b00795d1460749d0929d48a3450b9133,
title = "State of the art of network security perspectives in cloud computing",
abstract = "Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.",
keywords = "Cloud computing, cloud security guidance, network security, risk analysis",
author = "Oh, {Tae Hwan} and Shinyoung Lim and Choi, {Young B.} and Park, {Kwang Roh} and Heejo Lee and Hyunsang Choi",
year = "2010",
month = "11",
day = "9",
doi = "10.1007/978-3-642-16444-6_79",
language = "English",
isbn = "3642164439",
volume = "78 CCIS",
series = "Communications in Computer and Information Science",
pages = "629--637",
booktitle = "Communications in Computer and Information Science",

}

TY - GEN

T1 - State of the art of network security perspectives in cloud computing

AU - Oh, Tae Hwan

AU - Lim, Shinyoung

AU - Choi, Young B.

AU - Park, Kwang Roh

AU - Lee, Heejo

AU - Choi, Hyunsang

PY - 2010/11/9

Y1 - 2010/11/9

N2 - Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

AB - Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

KW - Cloud computing

KW - cloud security guidance

KW - network security

KW - risk analysis

UR - http://www.scopus.com/inward/record.url?scp=78049439962&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78049439962&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-16444-6_79

DO - 10.1007/978-3-642-16444-6_79

M3 - Conference contribution

AN - SCOPUS:78049439962

SN - 3642164439

SN - 9783642164439

VL - 78 CCIS

T3 - Communications in Computer and Information Science

SP - 629

EP - 637

BT - Communications in Computer and Information Science

ER -