Publications-Proceedings

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 Analysis on cloud-based security vulnerability assessment
作者 Li, H.-C.;Liang, Po Huei .;Yang, J.-M.;Chen, S.-J.
貢獻者 資管系
關鍵詞 Application softwares; Business models; Data centers; Enterprise IT; Flexible resources; Information technology infrastructure; Security; Security challenges; Security vulnerability assessments; Target information; Third parties; Virtual machines; Virtualizations; Vulnerability; Computer systems; Electronic commerce; Information technology; Personal computing; Risk analysis; Risk assessment; Cloud computing
日期 2010
上傳時間 20-May-2015 16:23:21 (UTC+8)
摘要 Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as a new information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers in large datacenters which raise many security challenges. The business model now allows the users to purchase the capacity they require when they require it. The providers can maximize the utilization by multiplexing customer virtual machines (VMs) across a shared physical infrastructure. In the shared cloud environment, it would be possible to launch an attack cross VMs. How to define the policies for individual virtual firewall becomes more important. In this paper, we investigate the different security vulnerability assessments among the cloud environments. Experiment shows there are more vulnerability happened if vulnerability tools and the servers are in the same LAN. In other word, the hackers can find an easier way to get the target information if sit on the same LAN. This experimental result can be used to analysis the risk in third party compute clouds. © 2010 IEEE.
關聯 Proceedings - IEEE International Conference on E-Business Engineering, ICEBE 2010
資料類型 conference
DOI http://dx.doi.org/10.1109/ICEBE.2010.77
dc.contributor 資管系-
dc.creator (作者) Li, H.-C.;Liang, Po Huei .;Yang, J.-M.;Chen, S.-J.-
dc.date (日期) 2010-
dc.date.accessioned 20-May-2015 16:23:21 (UTC+8)-
dc.date.available 20-May-2015 16:23:21 (UTC+8)-
dc.date.issued (上傳時間) 20-May-2015 16:23:21 (UTC+8)-
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/75186-
dc.description.abstract (摘要) Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as a new information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers in large datacenters which raise many security challenges. The business model now allows the users to purchase the capacity they require when they require it. The providers can maximize the utilization by multiplexing customer virtual machines (VMs) across a shared physical infrastructure. In the shared cloud environment, it would be possible to launch an attack cross VMs. How to define the policies for individual virtual firewall becomes more important. In this paper, we investigate the different security vulnerability assessments among the cloud environments. Experiment shows there are more vulnerability happened if vulnerability tools and the servers are in the same LAN. In other word, the hackers can find an easier way to get the target information if sit on the same LAN. This experimental result can be used to analysis the risk in third party compute clouds. © 2010 IEEE.-
dc.relation (關聯) Proceedings - IEEE International Conference on E-Business Engineering, ICEBE 2010-
dc.subject (關鍵詞) Application softwares; Business models; Data centers; Enterprise IT; Flexible resources; Information technology infrastructure; Security; Security challenges; Security vulnerability assessments; Target information; Third parties; Virtual machines; Virtualizations; Vulnerability; Computer systems; Electronic commerce; Information technology; Personal computing; Risk analysis; Risk assessment; Cloud computing-
dc.title (題名) Analysis on cloud-based security vulnerability assessment-
dc.type (資料類型) conferenceen
dc.identifier.doi (DOI) 10.1109/ICEBE.2010.77-
dc.doi.uri (DOI) http://dx.doi.org/10.1109/ICEBE.2010.77-