Research on cloud computing security based on the basic requirements of hierarchical protection
Source: Internet
Author: User
KeywordsCloud computing security level protection
Research on cloud computing security based on the basic requirements of hierarchical protection
Zhu San Cai
With the further development of cloud computing, the security problems of cloud computing are becoming more and more prominent, especially in the security of cloud computing, the confidentiality, integrity and usability of the user data is particularly prominent, cloud computing security has become the main obstacle and problem in the process of cloud computing. From two aspects of cloud application security and system security, this paper puts forward the threat of application security and system security in cloud computing security and the corresponding basic protection requirements.
Research on cloud computing security based on the basic requirements of hierarchical protection
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.