DocumentCode
584754
Title
Security of cloud computing system using object oriented technique
Author
Shukla, Satyavati ; Kumar Singh, Rakesh
Author_Institution
Dept. of Comput. Sci. & Eng., Kamala Nehru Inst. of Technol., Sultanpur, India
fYear
2012
fDate
26-28 July 2012
Firstpage
1
Lastpage
9
Abstract
Cloud computing is a new emerging technology. It has been coming forth as an alternative computing environment where web-based services allow for different kinds of users to obtain a large variety of resources, such as software and hardware. Cloud Computing provides a way to share large amount of distributed resources belonging to different organizations through the internet, So it is prone to several types of security risks. Therefore a systematic methodology and process are indispensable to analyze security requirements. The Security policies should be developed for cloud computing systems at multiple levels to threats, risk and vulnerability. Here we discuss about a high order object oriented techniques and methods for construction of robust security policy to build cloud system more reliable and trustworthy.
Keywords
Web services; cloud computing; distributed processing; object-oriented programming; security of data; Internet; Web based services; alternative computing environment; cloud computing system security; distributed resources; object oriented technique; robust security policy; security requirements; Image storage; Virtual machine monitors; Cloud Computing; Misuse cases; Security Policy; Security Requirements; Swimlane diagram; Use cases;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on
Conference_Location
Coimbatore
Type
conf
DOI
10.1109/ICCCNT.2012.6395865
Filename
6395865
Link To Document