{"title":"云计算:安全风险","authors":"La'Quata Sumter","doi":"10.1145/1900008.1900152","DOIUrl":null,"url":null,"abstract":"With the rise of the era of \"cloud computing\", concerns about \"Internet Security\" continue to increase. How will customers of the \"cloud\" know that their information will be available to them, as well as secure and safe from others? To address this problem we propose the design of a system that will capture the movement of information on the cloud. We will be identifying whether there is a need for some type of security capture device/measure on the cloud, which will allow users to know weather their information is secure and safe without comprising from threats and attacks.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"52","resultStr":"{\"title\":\"Cloud computing: security risk\",\"authors\":\"La'Quata Sumter\",\"doi\":\"10.1145/1900008.1900152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rise of the era of \\\"cloud computing\\\", concerns about \\\"Internet Security\\\" continue to increase. How will customers of the \\\"cloud\\\" know that their information will be available to them, as well as secure and safe from others? To address this problem we propose the design of a system that will capture the movement of information on the cloud. We will be identifying whether there is a need for some type of security capture device/measure on the cloud, which will allow users to know weather their information is secure and safe without comprising from threats and attacks.\",\"PeriodicalId\":333104,\"journal\":{\"name\":\"ACM SE '10\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"52\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM SE '10\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1900008.1900152\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM SE '10","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1900008.1900152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the rise of the era of "cloud computing", concerns about "Internet Security" continue to increase. How will customers of the "cloud" know that their information will be available to them, as well as secure and safe from others? To address this problem we propose the design of a system that will capture the movement of information on the cloud. We will be identifying whether there is a need for some type of security capture device/measure on the cloud, which will allow users to know weather their information is secure and safe without comprising from threats and attacks.