Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives

The security aspects of cloud computing, especially the security of data, become more and more important. It is necessary to find and develop the new mechanisms to secure the cloud. The prob- lem presented in the paper concerns the mechanisms for security of cloud computing with special attention paid to aspects of access control in clouds - the state of the art and the perspectives for the future.

[1]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[2]  Xiaohua Jia,et al.  Security for Cloud Storage Systems , 2013, SpringerBriefs in Computer Science.

[3]  Gary Anthes,et al.  Security in the cloud , 2010, Commun. ACM.

[4]  D. M. Hutton,et al.  Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .

[5]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[6]  Mohammad Ilyas,et al.  Cloud Computing and Software Services: Theory and Techniques , 2010 .

[7]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[8]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[9]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[10]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[11]  A. Poniszewska-Marańda Modeling and design of role engineering in development of access control for dynamic information systems , 2013 .

[12]  杨泽明,et al.  云计算安全 : 架构、战略、标准与运营 = Securing the cloud : cloud computer security techniques and t , 2013 .

[13]  John Doe,et al.  Cloud Computing and Software Services: Theory and Technique , 2009 .

[14]  Mohamed Hamdi,et al.  Security of Cloud Computing , 2015 .

[15]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[16]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[17]  Aneta Poniszewska-Maranda,et al.  Role engineering: From design to evolution of security schemes , 2008, J. Syst. Softw..

[18]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[19]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.