{"title":"私有云安全架构","authors":"M. Drozdova, I. Bridova, J. Uramová, M. Moravčík","doi":"10.1109/ICETA51985.2020.9379217","DOIUrl":null,"url":null,"abstract":"Cyber security is a current topic of the cyberspace, which includes Cloud Computing (CC) systems. Current use of CC and its expected development require strong security measures. The reason is the fact that data with sensitive information from several users enters the CC system and the disruption of the system or the leakage of such information is unacceptable. As how in building architecture, it is necessary to dimension the foundations, retaining walls and other parts of the building so that as a whole they form a fixed structure, in the architecture of ICT systems we must look at all components of each partial system too. Security architecture is one viewpoint of development in CC systems. Each deployment model and each CC service model in a particular implementation environment requires its own security framework. ICT standardization organizations have issued several recommendations and standards that provide principles for followed in the specific implementation of CC. The authors of the article used them in processing the Architecture description of the OpenStack private cloud in a university environment.","PeriodicalId":149716,"journal":{"name":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Private cloud security architecture\",\"authors\":\"M. Drozdova, I. Bridova, J. Uramová, M. Moravčík\",\"doi\":\"10.1109/ICETA51985.2020.9379217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber security is a current topic of the cyberspace, which includes Cloud Computing (CC) systems. Current use of CC and its expected development require strong security measures. The reason is the fact that data with sensitive information from several users enters the CC system and the disruption of the system or the leakage of such information is unacceptable. As how in building architecture, it is necessary to dimension the foundations, retaining walls and other parts of the building so that as a whole they form a fixed structure, in the architecture of ICT systems we must look at all components of each partial system too. Security architecture is one viewpoint of development in CC systems. Each deployment model and each CC service model in a particular implementation environment requires its own security framework. ICT standardization organizations have issued several recommendations and standards that provide principles for followed in the specific implementation of CC. The authors of the article used them in processing the Architecture description of the OpenStack private cloud in a university environment.\",\"PeriodicalId\":149716,\"journal\":{\"name\":\"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETA51985.2020.9379217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA51985.2020.9379217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber security is a current topic of the cyberspace, which includes Cloud Computing (CC) systems. Current use of CC and its expected development require strong security measures. The reason is the fact that data with sensitive information from several users enters the CC system and the disruption of the system or the leakage of such information is unacceptable. As how in building architecture, it is necessary to dimension the foundations, retaining walls and other parts of the building so that as a whole they form a fixed structure, in the architecture of ICT systems we must look at all components of each partial system too. Security architecture is one viewpoint of development in CC systems. Each deployment model and each CC service model in a particular implementation environment requires its own security framework. ICT standardization organizations have issued several recommendations and standards that provide principles for followed in the specific implementation of CC. The authors of the article used them in processing the Architecture description of the OpenStack private cloud in a university environment.