Page Header

Research on Information Security in Cloud Computing Environment

Quanhui Ren, Hui Gao


In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.


Cloud computing; Information security; Model

Full Text:



Zhao L, Qiu X. Cloud computing environment security threats and protection. China Computer Federation Newsletter, 2010,6 (5): 47-50.

Liu W, Meng X, Ling Y. A graph-based approach for web database sampling. Journal of Software, 2008, 16(2):179-193.

Gao M, Jin C, Wang X, Tian X, Zhou A. A survey on management of data provenance. Chinese Journal of Computers, 2010, 33(3):373-389.

Zhang Y, Chen C, Bo P, et al. Cloud computing security critical technical analysis. Telecommunications Science, 2010(9): 64-69.

Nathuji R, Schwan K. VirtualPower: coordinated power management in virtualized enterprise systems. SOSP '07. New York, NY, USA: ACM, 2007.265-278.

Pallipadi V, Starikovskiy A. The ondemand governor: past, present and future. Proceedings of Linux Symposium. 2006.223-238.

Rao L, Liu X, Le X, et al. Minimizing electricity cost: optimization of distributed internet data centers in a multi-electricity-market environment. INFOCOM'10. San Diego, California, USA: IEEE Press, 2010.1145-1153.

Samadiani E, Joshi Y, Mistree F. The thermal design of a next generation data center: a conceptual exposition. 2007.93-102.

Cheng X, Guo J, Jin X. A retrospective of web information retrieval and mining. Journal of Chinese Information Processing, 2011,26 (6) :111-117.

Shen H, Jin X, Ren F, Cheng X. Public opinion analysis for social media. China Computer Federation Newsletter, 2012, 8(4):32-36.



  • There are currently no refbacks.

Copyright (c) 2016 Quanhui Ren & Hui Gao

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.