{"title":"Security risk analysis for cloud computing systems","authors":"V. Mukhin, A. Volokyta","doi":"10.1109/IDAACS.2011.6072868","DOIUrl":null,"url":null,"abstract":"This paper devoted to the analysis of a cloud-specific vulnerabilities and risk analysis in the cloud systems. There are described the main characteristics of cloud systems and a reference architecture of cloud computing. Also, there is suggested the special estimations for the risk analysis, which are based on the preliminarily vulnerabilities analysis. The proposed approach allow to estimate the influence of the various factors on the effective risk level and to formulate the requirements to the security methods and mechanisms.","PeriodicalId":229218,"journal":{"name":"International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDAACS.2011.6072868","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
This paper devoted to the analysis of a cloud-specific vulnerabilities and risk analysis in the cloud systems. There are described the main characteristics of cloud systems and a reference architecture of cloud computing. Also, there is suggested the special estimations for the risk analysis, which are based on the preliminarily vulnerabilities analysis. The proposed approach allow to estimate the influence of the various factors on the effective risk level and to formulate the requirements to the security methods and mechanisms.