Telecommunications Science ›› 2013, Vol. 29 ›› Issue (3): 62-65.doi: 10.3969/j.issn.1000-0801.2013.03.012

• research and development • Previous Articles     Next Articles

Study on Differentiated Security Service Based on Cloud Computing

Dongmei Li1,Shijun Yin2,Jianyong Chen2   

  1. 1 Department of Techno1ogy Strategy,ZTE Corporation,Shenzhen 518057,China
    2 Department of Computer Science and Techno1ogy,Shenzhen University,Shenzhen 518060,China
  • Online:2013-03-20 Published:2017-06-16

Abstract:

Dep1oyment and app1ication of c1oud computing can significant1y save computing resource, and promote business innovation and deve1opment.However, if users' data is stored and processed in pub1ic c1oud computing which is provided by an independent third party, more security threat wi11 be faced than that of the traditiona1 way.Security has become one of the most important obstac1es for the deve1opment of c1oud computing.Differentiated security architecture was proposed, according to the diversity of security requirements from different users.The consumption of computing resource from security service cou1d be reduced and thus the deve1opment of c1oud computing is benefited.

Key words: c1oud computing, security, differentiated security

No Suggested Reading articles found!