آی اس آی پیپر

دانلود رایگان مقاله isi با ترجمه فارسی

آی اس آی پیپر

دانلود رایگان مقاله isi با ترجمه فارسی

آی اس آی پیپر

وبسایت آی اس آی پیپر ارائه دهنده امکان دانلود رایگان مقالات انگلیسی ISI به همراه ترجمه فارسی از جدیدترین مقالات لاتین 2017 و 2018

طبقه بندی موضوعی

دانلود رایکان مقاله انگلیسی ISI با موضوع امنیت رایانش ابری


عنوان فارسی مقاله:

پرداختن به موضوعات امنیت رایانش ابری


عنوان انگلیسی مقاله:

Addressing cloud computing security issues


دانلود رایگان مقاله ISI با فرمت PDF:


مشاهده توضیحات کامل و خرید ترجمه فارسی با فرمت ورد تایپ شده:


بخشی از مقاله انگلیسی :


3. Cloud computing security

3.1. Trust

Trust is not a new research topic in computer science, spanning areas as diverse as security and access control in computer networks, reliability in distributed systems, game theory and agent systems, and policies for decision making under uncertainty [8]. Perhaps the most notable example was the development of the Trusted Computer System Evaluation Criteria (TCSEC) [9] in the late 70s and early 80s. Here, trust was used in the process of convincing observers that a system (model, design or implementation) was correct and secure [10]. The concept of trust, adjusted to the case of two parties involved in a transaction, can be described as follows: ‘‘An entity A is considered to trust another entity B when entity A believes that entity B will behave exactly as expected and required’’ [11]. Thereinafter, an entity can be considered trustworthy, if the parties or people involved in transactions with that entity rely on its credibility. In general, the concept described above can be verbally represented by the term reliability, which refers to the quality of a person or entity that is worthy of trust. Trust in the information society is built on various different grounds, based on calculus, on knowledge or on social reasons [12]. The notion of trust in an organization could be defined as the customer’s certainty that the organization is capable of providing the required services accurately and infallibly. A certainty which also expresses the customer’s faith in its moral integrity, in the soundness of its operation, in the effectiveness of its security mechanisms, in its expertise and in its abidance by all regulations and laws, while at the same time, it also contains the acknowledgement of a minimum risk factor, by the relying party. The notion of security refers to a given situation where all possible risks are either eliminated or brought to an absolute minimum [13]. Trust in a cloud environment depends heavily on the selected deployment model, as governance of data and applications is outsourced and delegated out of the owner’s strict control. In traditional architectures, trust was enforced by an efficient security policy, which addressed constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people. In a cloud deployment, this perception is totally obscured. In the case of public or community clouds, control is delegated to the organization owning the infrastructure. When deploying on a public cloud, control is mitigated to the infrastructure owner to enforce a sufficient security policy that guarantees that appropriate security activities are being performed to ensure that risk is reduced. This introduces a number of risks and threats, as essentially security is related to trusting the processes and computing base implemented by the cloud owner. It is crucial to differentiate between deployment models, as a private cloud, where the infrastructure is operated and managed on premise by a private organization, does not introduce additional unique security challenges, as trust remains within the organization. In such a situation the infrastructures owner remains the data and process owner.


نظرات (۰)

هیچ نظری هنوز ثبت نشده است
ارسال نظر آزاد است، اما اگر قبلا در بیان ثبت نام کرده اید می توانید ابتدا وارد شوید.
شما میتوانید از این تگهای html استفاده کنید:
<b> یا <strong>، <em> یا <i>، <u>، <strike> یا <s>، <sup>، <sub>، <blockquote>، <code>، <pre>، <hr>، <br>، <p>، <a href="" title="">، <span style="">، <div align="">
تجدید کد امنیتی