O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15

Data Security in Cloud Computing

Shucheng Yu, Wenjing Lou, Kui Ren

15.1 Overview

Cloud computing is a new IT infrastructure in which computing resources are provided as a utility to cloud users in the pay-as-you-go manner. By integrating techniques such as Service Oriented Architecture (SOA), virtualization, distributed computing, etc, cloud computing offers elastic, on-demand, and measured services to cloud users anytime, anywhere whenever Internet is available and enables them to enjoy the illusion of unlimited computing resources. The services provided by the cloud can be at different levels of the system stack, which can be described by the terminology of “X as a service (XaaS),” where X could be Software, Infrastructure, Hardware, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required