TY - GEN
T1 - On cloud computing security
AU - Bai, Yun
AU - Policarpio, Sean
PY - 2011
Y1 - 2011
N2 - ![CDATA[Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance. The organizations can reduce their operational cost and concentrate on their strategic planning by using services provided by cloud computing. Generally, the success of cloud computing depends on three key issues: data security, fast Internet access and standardization [17]. Among the three issues, the biggest concern is data security. In this paper, we investigate the security issue related to datacenter of cloud computing. By analyzing the properties of the data stored at the datacenter, we propose a logical approach to specify the data and employ intelligent agents to enforce appropriate security policies on it. We expect such approach will protect the datacenter by only allowing the legitimate users accessing the data and preventing any malicious attempt to it.]]
AB - ![CDATA[Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance. The organizations can reduce their operational cost and concentrate on their strategic planning by using services provided by cloud computing. Generally, the success of cloud computing depends on three key issues: data security, fast Internet access and standardization [17]. Among the three issues, the biggest concern is data security. In this paper, we investigate the security issue related to datacenter of cloud computing. By analyzing the properties of the data stored at the datacenter, we propose a logical approach to specify the data and employ intelligent agents to enforce appropriate security policies on it. We expect such approach will protect the datacenter by only allowing the legitimate users accessing the data and preventing any malicious attempt to it.]]
UR - http://handle.uws.edu.au:8081/1959.7/545119
UR - http://airccse.org/wimo2011/wimo2011.html
U2 - 10.1007/978-3-642-21937-5_37
DO - 10.1007/978-3-642-21937-5_37
M3 - Conference Paper
SN - 9783642219368
SP - 388
EP - 396
BT - Recent Trends in Wireless and Mobile Networks: Proceedings Third International Conferences WiMo 2011 and CoNeCo 2011, Ankara, Turkey, June 26-28, 2011
PB - Springer
T2 - WiMo 2011
Y2 - 26 June 2011
ER -