{"title":"云计算安全故障趋势分析","authors":"Zachariah Pabi Gariba, J. A. V. D. Poll","doi":"10.1109/CIC.2017.00041","DOIUrl":null,"url":null,"abstract":"Cloud computing technology is causing a shift in Information Communication Technology usage by transforming the approaches businesses employ information technology services. This benefits computing usage by allowing users to share hardware resources via multiplexing of virtual machines which are the basic units of cloud computing. Small and new businesses which often lack good financial standing but desire to use the cloud, need not own these resources, but only pay for their use at a reduced price. This alleviates the cost of technological maintenance and operation. However, the services provided by third-party cloud service providers involve inherent security threats. The relocation of corporate resources to an external administrative jurisdiction escalates security concerns such as trust, assurance and transparency. There may be devastating effects to clients, should their financial transactions and corporate information be compromised as a result of a service provider's security challenges. This research employs a quantitative case study to analyse the security challenges of popular cloud computing services existing within the past four years. An overview of security vulnerabilities in cloud computing is presented; a preliminary cloud security framework is developed and the role of computing formalisms is investigated.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security Failure Trends of Cloud Computing\",\"authors\":\"Zachariah Pabi Gariba, J. A. V. D. Poll\",\"doi\":\"10.1109/CIC.2017.00041\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing technology is causing a shift in Information Communication Technology usage by transforming the approaches businesses employ information technology services. This benefits computing usage by allowing users to share hardware resources via multiplexing of virtual machines which are the basic units of cloud computing. Small and new businesses which often lack good financial standing but desire to use the cloud, need not own these resources, but only pay for their use at a reduced price. This alleviates the cost of technological maintenance and operation. However, the services provided by third-party cloud service providers involve inherent security threats. The relocation of corporate resources to an external administrative jurisdiction escalates security concerns such as trust, assurance and transparency. There may be devastating effects to clients, should their financial transactions and corporate information be compromised as a result of a service provider's security challenges. This research employs a quantitative case study to analyse the security challenges of popular cloud computing services existing within the past four years. An overview of security vulnerabilities in cloud computing is presented; a preliminary cloud security framework is developed and the role of computing formalisms is investigated.\",\"PeriodicalId\":156843,\"journal\":{\"name\":\"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIC.2017.00041\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIC.2017.00041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud computing technology is causing a shift in Information Communication Technology usage by transforming the approaches businesses employ information technology services. This benefits computing usage by allowing users to share hardware resources via multiplexing of virtual machines which are the basic units of cloud computing. Small and new businesses which often lack good financial standing but desire to use the cloud, need not own these resources, but only pay for their use at a reduced price. This alleviates the cost of technological maintenance and operation. However, the services provided by third-party cloud service providers involve inherent security threats. The relocation of corporate resources to an external administrative jurisdiction escalates security concerns such as trust, assurance and transparency. There may be devastating effects to clients, should their financial transactions and corporate information be compromised as a result of a service provider's security challenges. This research employs a quantitative case study to analyse the security challenges of popular cloud computing services existing within the past four years. An overview of security vulnerabilities in cloud computing is presented; a preliminary cloud security framework is developed and the role of computing formalisms is investigated.