Telecommunications Science ›› 2010, Vol. 26 ›› Issue (6): 67-70.doi: 10.3969/j.issn.1000-0801.2010.06.015

• Topics:cloud computing and response • Previous Articles     Next Articles

Research on Cloud Computing Security

Laifu Wang,Jun Shen,Huamin Jin   

  1. Guangdong Research Institute of China Telecom Co.,Ltd.,Guangzhou 510630,China
  • Online:2010-06-15 Published:2010-06-15

Abstract:

As a new business model of Internet applications,the applications of cloud computing have been developed rapidly,and the security is the prime consideration for the customer to adapt cloud computing,and it's also the basis to be developed healthily and sustainably.The paper analyzes cloud computing threats facing the technical and legal compliance risks,and gives the security policy and recommendations from the perspective of cloud computing service provider and the customer.

Key words: cloud computing, cloud computing security, network security

No Suggested Reading articles found!