Proceedings of the 2nd International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2014)

Data Security Issues in the Process of Applying Cloud Computing

Authors
Kai Wang, Xia Yang
Corresponding Author
Kai Wang
Available Online March 2014.
DOI
10.2991/sekeie-14.2014.32How to use a DOI?
Keywords
Cloud computing, data security, authentication mechanism, storage architecture, security strategy
Abstract

In recent years after the cloud computing architecture through the fast development period, inevitably exposed in terms of data security problems. The calculated data safety platform in the cloud through several occurred recently, more to deepen some questions about cloud computing. This article from the cloud data security problem of cloud computing, to improve data security measures.

Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2014)
Series
Advances in Intelligent Systems Research
Publication Date
March 2014
ISBN
10.2991/sekeie-14.2014.32
ISSN
1951-6851
DOI
10.2991/sekeie-14.2014.32How to use a DOI?
Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Kai Wang
AU  - Xia Yang
PY  - 2014/03
DA  - 2014/03
TI  - Data Security Issues in the Process of Applying Cloud Computing
BT  - Proceedings of the 2nd International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2014)
PB  - Atlantis Press
SP  - 135
EP  - 138
SN  - 1951-6851
UR  - https://doi.org/10.2991/sekeie-14.2014.32
DO  - 10.2991/sekeie-14.2014.32
ID  - Wang2014/03
ER  -