{"title":"从风险角度衡量云安全","authors":"Savy Gupta, S. Gupta, R. Majumdar, Y. Rathore","doi":"10.1109/CONFLUENCE.2016.7508116","DOIUrl":null,"url":null,"abstract":"Cloud computing is not a new technology but is a new way of distributing computing resources. From past few years it has emerged as the most widely used computing paradigm. It offers services in an adaptable manner and therefore helps in efficient computing by centralizing memory processing and storage. Thus it has become a welcome change for the information technology industry. While it has become a topic of conversation in the industry, there are risks associated with the adoption of cloud services. The objective of this work is to reveal and explore the risks encountered when adopting cloud computing and how their existence affects the intended user. The strategy implemented in this work is to layout mitigation strategies that should be followed to avoid such risks.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Measuring Cloud Security from risks perspective\",\"authors\":\"Savy Gupta, S. Gupta, R. Majumdar, Y. Rathore\",\"doi\":\"10.1109/CONFLUENCE.2016.7508116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is not a new technology but is a new way of distributing computing resources. From past few years it has emerged as the most widely used computing paradigm. It offers services in an adaptable manner and therefore helps in efficient computing by centralizing memory processing and storage. Thus it has become a welcome change for the information technology industry. While it has become a topic of conversation in the industry, there are risks associated with the adoption of cloud services. The objective of this work is to reveal and explore the risks encountered when adopting cloud computing and how their existence affects the intended user. The strategy implemented in this work is to layout mitigation strategies that should be followed to avoid such risks.\",\"PeriodicalId\":299044,\"journal\":{\"name\":\"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONFLUENCE.2016.7508116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONFLUENCE.2016.7508116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud computing is not a new technology but is a new way of distributing computing resources. From past few years it has emerged as the most widely used computing paradigm. It offers services in an adaptable manner and therefore helps in efficient computing by centralizing memory processing and storage. Thus it has become a welcome change for the information technology industry. While it has become a topic of conversation in the industry, there are risks associated with the adoption of cloud services. The objective of this work is to reveal and explore the risks encountered when adopting cloud computing and how their existence affects the intended user. The strategy implemented in this work is to layout mitigation strategies that should be followed to avoid such risks.