{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T18:40:25Z","timestamp":1739990425962,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>The leap development of Internet gives computer science infinite possibility. Meanwhile, the emerging cloud computing has become a tremendous boost of Internet innovation. It alters the traditional IT service models to a remote service and provides massive storage without the limitation of computer processing capacity. This unique storing service paradigm apparently brings a series of benefits and convenience to most Internet enterprises especially start-ups. However, few attentions have been paid to the potential security issues and challenges with the rapid development of cloud computing. During the frequent processing between cloud providers and users, cloud security has been cited as a vital problem as cloud computing outputs data in a virtual environment through the internet. Virtual computing is more vulnerable to various attacks such as data loss and leakage. Hence, comprehensive solutions are significantly necessary to solve these problems in cloud systems. In this paper, we will briefly introduce the definition of cloud computing firstly. And cloud security structure is given in the second part, which includes three main cloud types and three service models. Moreover, crucial security threats and challenges in the cloud computing are illustrated and corresponding solutions are proposed accordingly in the last part.<\/jats:p>","DOI":"10.3233\/978-1-61499-796-2-175","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T18:02:07Z","timestamp":1739988127000},"source":"Crossref","is-referenced-by-count":0,"title":["Security Issues and Solutions in Cloud Computing"],"prefix":"10.3233","author":[{"family":"Xie Yujie","sequence":"additional","affiliation":[]},{"family":"Lee Yeonju","sequence":"additional","affiliation":[]},{"family":"Kim Kwangmin","sequence":"additional","affiliation":[]},{"family":"Kim Pankoo","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Ambient Intelligence and Smart Environments","Intelligent Environments 2017"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T18:12:31Z","timestamp":1739988751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-61499-795-5&spage=175&doi=10.3233\/978-1-61499-796-2-175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-796-2-175","relation":{},"ISSN":["1875-4163"],"issn-type":[{"value":"1875-4163","type":"print"}],"subject":[],"published":{"date-parts":[[2017]]}}}