Loading…
Information security issue of enterprises adopting the application of cloud computing
Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired/wireless networking, providing sufficient...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired/wireless networking, providing sufficient assurance of information security such as confidentiality, authentication, non-repudiation, and integrity is the critical factor of success promotion. In this paper, a dynamic intrusion detection system for strengthening the security application of cloud computing is proposed. In the proposed mechanism, numbers of intrusion detectors are dispatched on the whole topology of the networking system through multi-layers and multi-stages deployment. Those information security issues related with the application and service of cloud computing will be experimented and discussed. The experiments include the equipment security of the client side termination, the threats of web site and webpage, the detection and diagnosis and surveillance of intrusion, the access and security of database in the cloud side, the detection of system leakage and the monitor of real-time repairing process, the management of server system, the management of mobile e-commerce processing, and the integrated analysis of associated security information and issues. The goal of the proposed mechanism is not only focused on find out some solutions, but also focused on develop some feasible information security techniques or products for the application and service of cloud computing. Experimental results demonstrate that the proposed mechanism does provide good performance for intrusion detection. |
---|