{"title":"云计算系统安全风险分析","authors":"V. Mukhin, A. Volokyta","doi":"10.1109/IDAACS.2011.6072868","DOIUrl":null,"url":null,"abstract":"This paper devoted to the analysis of a cloud-specific vulnerabilities and risk analysis in the cloud systems. There are described the main characteristics of cloud systems and a reference architecture of cloud computing. Also, there is suggested the special estimations for the risk analysis, which are based on the preliminarily vulnerabilities analysis. The proposed approach allow to estimate the influence of the various factors on the effective risk level and to formulate the requirements to the security methods and mechanisms.","PeriodicalId":229218,"journal":{"name":"International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Security risk analysis for cloud computing systems\",\"authors\":\"V. Mukhin, A. Volokyta\",\"doi\":\"10.1109/IDAACS.2011.6072868\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper devoted to the analysis of a cloud-specific vulnerabilities and risk analysis in the cloud systems. There are described the main characteristics of cloud systems and a reference architecture of cloud computing. Also, there is suggested the special estimations for the risk analysis, which are based on the preliminarily vulnerabilities analysis. The proposed approach allow to estimate the influence of the various factors on the effective risk level and to formulate the requirements to the security methods and mechanisms.\",\"PeriodicalId\":229218,\"journal\":{\"name\":\"International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IDAACS.2011.6072868\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDAACS.2011.6072868","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security risk analysis for cloud computing systems
This paper devoted to the analysis of a cloud-specific vulnerabilities and risk analysis in the cloud systems. There are described the main characteristics of cloud systems and a reference architecture of cloud computing. Also, there is suggested the special estimations for the risk analysis, which are based on the preliminarily vulnerabilities analysis. The proposed approach allow to estimate the influence of the various factors on the effective risk level and to formulate the requirements to the security methods and mechanisms.