A Cloud Services Security Analysis
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F62690094%3A18450%2F20%3A50017002" target="_blank" >RIV/62690094:18450/20:50017002 - isvavai.cz</a>
Výsledek na webu
<a href="https://link.springer.com/chapter/10.1007%2F978-981-15-3380-8_26" target="_blank" >https://link.springer.com/chapter/10.1007%2F978-981-15-3380-8_26</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-981-15-3380-8_26" target="_blank" >10.1007/978-981-15-3380-8_26</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
A Cloud Services Security Analysis
Popis výsledku v původním jazyce
The aim of the article is the analysis of cloud services and data stored into cloud infrastructure. At first, history and principles of cloud computing technology are introduced. This is flowed by the introduction of security threats related to the use of cloud computing technology for storing data into cloud infrastructure managed by a third-party subject, whose infrastructure is different from that of the owner of the stored data. Based on the identification of security threat identification, tools designated for encryption of data saved into cloud, and allowing for increased security and mitigation of threats related to cloud data storing are showcased. Furthermore, these tools are compared using a comparative analysis in terms of workload on system and network adapter resources while encrypting and storing the data into cloud. As part of the comparative analysis, a comparison of encryption and saving of a single 1-GB file and 10,000.txt files was performed. In the last part of the article, the results of the comparative analysis are interpreted visually and with the description of the measured values.
Název v anglickém jazyce
A Cloud Services Security Analysis
Popis výsledku anglicky
The aim of the article is the analysis of cloud services and data stored into cloud infrastructure. At first, history and principles of cloud computing technology are introduced. This is flowed by the introduction of security threats related to the use of cloud computing technology for storing data into cloud infrastructure managed by a third-party subject, whose infrastructure is different from that of the owner of the stored data. Based on the identification of security threat identification, tools designated for encryption of data saved into cloud, and allowing for increased security and mitigation of threats related to cloud data storing are showcased. Furthermore, these tools are compared using a comparative analysis in terms of workload on system and network adapter resources while encrypting and storing the data into cloud. As part of the comparative analysis, a comparison of encryption and saving of a single 1-GB file and 10,000.txt files was performed. In the last part of the article, the results of the comparative analysis are interpreted visually and with the description of the measured values.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2020
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Intelligent Information and Database Systems
ISBN
978-981-15-3379-2
ISSN
1865-0929
e-ISSN
1865-0937
Počet stran výsledku
12
Strana od-do
296-307
Název nakladatele
Springer
Místo vydání
Singapore
Místo konání akce
Phuket, Thailand
Datum konání akce
23. 3. 2020
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—