This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
On-Demand Security Architecture for Cloud Computing
July 2012 (vol. 45 no. 7)
pp. 73-78
Jianyong Chen, Shenzhen University, China
Yang Wang, Shenzhen University, China
Xiaomin Wang, Shenzhen University, China
An architecture that differentiates security according to service-specific characteristics avoids an unnecessary drain on IT resources by protecting a variety of cloud computing services at just the right level.

1. H. Takabi, J.B.D. Joshi, and G.J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” Computer, June 2010, pp. 24-31.
2. S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J. Network and Computer Applications, vol. 34, no. 1, 2011, pp. 1-11.
3. C. Wang et al., “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, 2010, pp. 19-24.
4. Q. Wang et al., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, 2011, pp. 847-859.
5. L.K. Hu, S. Yi, and X.Y. Jia, “A Semantics-Based Approach for Cross Domain Access Control,” J. Internet Technology, vol. 11, no. 2, 2010, pp. 279-288.
6. G. Pallis, “Cloud Computing: The New Frontier of Internet Computing,” IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 70-73.
7. R.P. Lua and K.C. Yow, “Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Network,” IEEE Network, vol. 25, no. 4, 2011, pp. 28-33.
8. V.H. Pham and M. Dacier, “Honeypot Trace Forensics: The Observation Viewpoint Matters,” Future Generation Computer System—Int'l J. Grid Computing and E-science, vol. 27, no. 5, 2011, pp. 539-546.

Index Terms:
cloud computing, security architecture, on-demand services
Citation:
Jianyong Chen, Yang Wang, Xiaomin Wang, "On-Demand Security Architecture for Cloud Computing," Computer, vol. 45, no. 7, pp. 73-78, July 2012, doi:10.1109/MC.2012.120
Usage of this product signifies your acceptance of the Terms of Use.