Computer and Modernization ›› 2012, Vol. 1 ›› Issue (6): 176-178,.doi: 10.3969/j.issn.1006-2475.2012.06.047

• 信息安全 • Previous Articles     Next Articles

Analysis of Key Technologies on Cloud Computing Security

GUO Rui-peng   

  1. School of Computer Science, South China Normal University, Guangzhou 510631, China
  • Received:2012-02-16 Revised:1900-01-01 Online:2012-06-14 Published:2012-06-14

Abstract: The emergence of cloud computing enables the enterprises and individuals through the network to use computing resources and storage resources conveniently, cloud computing in data security issues are also increasingly attracted widespread attention. This paper discusses the objectives and requirements of cloud computing security, and analyzes the cloud computing user access, encryption technology, access control, virtualization security and other critical security technologies.

Key words: cloud computing security, user access, encryption technology, access control, virtualization security

CLC Number: