Abstract
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gartner Says Cloud Computing Will Be As Influential As E-business (June 2008), http://www.gartner.com/it/page.jsp?id=707508
Lim, C.: Cloud Computing Security Technology. Review of KIISC 19(3), 14–17 (2009)
Dikaiakos, M.D., et al.: Cloud Computing Distributed Internet Computing for IT and Scientific Research. In: IEEE Internet Computing, pp. 10–13 (September/October 2009)
Gartner, Assessing the Security Risks of Cloud Computing (June 2008), http://www.gartner.com/Display_Document?id=685308
Armbrust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing. In: Technical Report No.UCB/EECS-2009-28 (2009), doi: http://www.eeec.berkeley.edu/Pubs/TechRpts/2009/EEEC-2009-28.html
Cloud computing, wikipedia, http://en.wikipedia.org/wiki/Cloud_computing
Andrei, T.: Cloud Computing Challenges and Related Security Issues (May 2009), http://www.cs.wustl.edu/~jain/cse571-09/ftp/cloud.pdf
http://www.cloudtech.org/2010/07/19/cloud-computing-%E2%80%93-the-emerging-computing-technology/
Mirzaei, N.: Cloud Computing (2008), http://grids.ucs.indiana.edu/ptliupages/publications/ReportNarimanMirzaeiJan09.pdf
Brodkin, J.: Gartner: Seven cloud-computing security risks, Infoword (July 2008), http://www.infoworld.com/article/08/07/02/Gartner_Seven_cloudcomputing_security_Risks1.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, H., Choi, E. (2010). Challenges and Security in Cloud Computing. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-17604-3_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17603-6
Online ISBN: 978-3-642-17604-3
eBook Packages: Computer ScienceComputer Science (R0)