This section addresses the core theme of this chapter, i.e., the security and privacy-related challenges in
cloud computing. There are numerous security issues for cloud computing as it encompasses many
technologies including networks, databases, operating systems, virtualization, resource scheduling,
transaction management, load balancing, concurrency control and memory management. Therefore,
security issues for many of these systems and technologies are applicable to cloud computing. For
example, the network that interconnects the systems in a cloud has to be secure. Furthermore,
virtualization paradigm in cloud computing leads to several security concerns. For example, mapping the
virtual machines to the physical machines has to be carried out securely. Data security involves
encrypting the data as well as ensuring that appropriate policies are enforced for data sharing. In addition,
resource allocation and memory management algorithms have to be secure. Finally, data mining
techniques may be applicable for malware detection in the clouds – an approach which is usually adopted
in intrusion detection systems (
This section addresses the core theme of this chapter, i.e., the security and privacy-related challenges incloud computing. There are numerous security issues for cloud computing as it encompasses manytechnologies including networks, databases, operating systems, virtualization, resource scheduling,transaction management, load balancing, concurrency control and memory management. Therefore,security issues for many of these systems and technologies are applicable to cloud computing. Forexample, the network that interconnects the systems in a cloud has to be secure. Furthermore,virtualization paradigm in cloud computing leads to several security concerns. For example, mapping thevirtual machines to the physical machines has to be carried out securely. Data security involvesencrypting the data as well as ensuring that appropriate policies are enforced for data sharing. In addition,resource allocation and memory management algorithms have to be secure. Finally, data miningtechniques may be applicable for malware detection in the clouds – an approach which is usually adoptedin intrusion detection systems (
การแปล กรุณารอสักครู่..