Security of cloud computing technology

Main Article Content

Suchart Khummanee

Abstract

        This article is explained problems and solutions to solve security problems of cloud computing technology which is the high-performance computer system. It is a very interesting topic at present. The aims of this technology are for respond processing of large amounts of data, complexity, flexibilities for applications and reduce the cost of processing. Currently this technology is still at its beginning stage of practical use. Thus, the security problems are still important and interesting problem at present.

Article Details

How to Cite
Khummanee, S. (2017). Security of cloud computing technology. Asia-Pacific Journal of Science and Technology, 18(2), 221–239. Retrieved from https://so01.tci-thaijo.org/index.php/APST/article/view/82841
Section
Research Articles

References

[1] Buyya R. High Performance Cluster Computing: Architectures and Systems. New York USA: Prentice Hall; 1999. p. 94-104.
[2] Rajkumar Buyya, Bubendorfer K. Market-Oriented Grid and Utility Computing. New York USA: John Wiley & Sons, Inc.,; November 2009. p. 123-187.
[3] Barbara P. Heath, Vetter RJ. Fostering Undergraduate Research Partnerships through a Graphical User Environment for the North Carolina Computing Grid final report: The University of North Carolina WilmingtonMay; 2007.
[4] Mariana Carroll, Merwe Avd, editors. Secure Cloud Computing Benefits, Risks and Controls Information Security South Africa (ISSA); 2011 Aug 15-17; Johannesburg; South Africa: IEEE; 2011.
[5] Bhaskar Prasad Rimal, Choi E, editors. A Taxonomy and Survey of Cloud Computing Systems. 2009 Fifth International Joint Conference on INC IMS and IDC (2009); 2009 Aug 25- 27; Seoul, Korea: IEEE; 2009.
[6] Gerlach G. Defining Cloud Computing from the scratch [Internet]. 2009 [updated 2011 April 9; cited 2012 April 3]. Available from: http://www.gunthergerlach.com/tag/amazon-web-services
[7] FlexiScale. Utility computing on demand [Internet]. 2009 [updated 2010 Jan; cited 2012 April 30]. Available from: http://flexiscale.com/
[8] Radu Prodan, Ostermann S, editors. A Survey and Taxonomy of Infrastructure as a Service and Web Hosting Cloud Providers. 10th IEEE/ACM International Conference on Grid Computing; 2009 Oct 13-15; Banff, AB: IEEE; 2009.
[9] Kai Hwang, Kulkarni S, editors. Cloud Security with Virtualized Defense and Reputation-based Trust Management. 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing; 2009 Dec 12-14; Chengdu: IEEE; 2009.
[10] B. Sotomayor ea, editor. Virtual Infrastructure Management in Private and Hybrid Clouds. Internet Computing, IEEE; 2009 Sept 09; New York: IEEE; 2009.
[11] Kai Hwang, Li D, editors. Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE INTERNET COMPUTING; 2010 Sept 02; New York: IEEE; 2010.
[12] P. Mell, Grance T. The NIST Definition of Cloud Computing: National Institute of Standards and Technology, U.S. Department of Commerce; 2011 Sept. 7 p.
[13] Popovic, Kresimir, editors. Cloud computing security issues and challenges. MIPRO, 2010 Proceedings of the 33rd International Convention; 2010 May 24-28; Opatija, Croatia: IEEE; 2010.
[14] M. Casassa-Mont, Bramhall SPaP, editors. Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services; 2003 Sept 1-5; UK. New York: IEEE; 2003.
[15] M. Carroll ea, editor. Secure Virtualization: Benefits, Risks and Controls. The 1st International Conference on Cloud Computing and Services Science; 2011 May 7-9; Noordwijkerhout, The Netherlands: SciTePress; 2011.[16] Kai Hwang, Li D, editors. Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE INTERNET COMPUTING; 2010 Sept 02; UK. New York: IEEE; 2010.
[17] Buyya R, Ranjan R, Calheiros RN, editors. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. Cluster Computing and the Grid, CCGRID ‘09 9th; 2009 May 18-21; Shanghai: IEEE; 2009.
[18] Gartner. Seven cloud-computing security risks [Internet]. 2008 [updated 2010 July 2; cited 2012 April 3]. Available from: http://www.network-world.com/news/2008/070208-cloud.html
[19] Robert Richardson. 2008 CSI Computer Crime and Security Survey [Internet]. 2008 [updated 2008 May 12; cited 2012 April 15]. Available from: http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf
[20] Farhan Bashir Shaikh, Haider S, editors. Security Threats in Cloud Computing. 6th International Conference on Internet Technology and Secured Transactions; 2011 Dec 11-14; Abu Dhabi, United: IEEE; 2011.