Security Architectures for Cloud Computing

Download Now Date Added: Oct 2010
Format: PDF

Moving computing into the "Cloud" makes computer processing much more convenient for users but also presents them with new security problems about safety and reliability. To solve these problems, service providers must establish and provide security architectures for Cloud computing. This paper describes domestic and international trends in security requirements for Cloud computing, along with security architectures proposed by Fujitsu such as access protocol, authentication and IDentity (ID) management, and security visualization.