Sie sind auf Seite 1von 9

The Journal of China

Universities of Posts and


Telecommunications
December 2013, 20(Suppl. 2): 105112
www.sciencedirect.com/science/journal/10058885 http://jcupt.xsw.bupt.cn

Analysis on the risk of personal cloud computing based on


the cloud industry chain
XIE Xue-mei (), ZHAO Yu-xi

School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing 100876, China

Abstract
This paper reviews the literature about cloud computing, and establishes a framework for industry chain of personal cloud
computing which is based on the current cloud industry chain in China. Then it summarizes the potential risks of personal
cloud from the angle of user perception, including risk identification, qualitative evaluation, and risk handling strategy. Finally,
according to the existing related policy or regulation scheme, this paper proposes some suggestions and optimization strategies
about the personal cloud computing.

Keywords personal cloud computing, industry chain of personal cloud computing, risk management, regulation

1 Introduction improved, which would increase the risks of personal data


security undoubtedly. Relevant literature show that there is
Development of cloud computing can be traced back to only a few researches or professional literature about
sixties of last century, but until the 21st century, cloud personal cloud computing currently in China, especially on
computing is widely regarded important, and gradually security issues or risk analysis, and there are still lack of
become the mainstream of the future development relevant laws and regulations [3]. Therefore, on the basis
direction. Personal cloud computing is an extension of of previous studies, this paper analyzes the characteristics
cloud computing in the personal domain, based on of personal cloud computing; using existing related
Internet-centric handling of personal information. That is research and analysis about cloud computing industry
to say, personal cloud computing organizes, stores, chain and building an industry chain framework of
distributes and reprocesses a variety of personal personal cloud computing. And it provides services like a
information via the Internet [1]. As all of the clouds, risk factors identification, analysis and monitoring from
Personal cloud computing is composed by the server, the angle of users. Finally, combined with the existing
terminals, applications and personal information. Due to regulatory policies, this paper puts forward some
the service principle and characteristics of personal cloud suggestions and optimization strategies about the personal
computing, personal data has to be stored in a common cloud computing. These results of research would be
server in order to be calculated by running Web helpful to related departments in the future.
applications, provided to the services terminal through a
network. Then those data will be available to the users by a 2 Cloud industry chain establishment
web browser or client software [2].
With the development of personal cloud computing, the 2.1 Analysis of cloud industry chain in China
convenience of accessing information will be highly
Industry chain is a concept in industrial economics. It is
a chain of objects in various industrial sectors based on
Received date: 29-06-2013
Corresponding author: XIE Xue-mei, E-mail: xxuem@bupt.edu.cn specific technical and economic relevance, and according
DOI: 10.1016/S1005-8885(13)60211-3
106 The Journal of China Universities of Posts and Telecommunications 2013

to specific logical relationship between objective and relatively abundant in China. Almost all the kinds of
spatiotemporal structure formed by chain-type relationship industry chains are basically similar, although there is no
patterns. single concept yet. One of the simple chains [4] is shown
At present, types of cloud computing industry chain are below as Fig. 1:

Fig. 1 Cloud industry chain structure

The chain above consists of three major components. provide cloud application service.
From the bottom to the top are: auxiliary chain, main chain Cloud application service provider: cooperates with the
and the functions of the main chain. From this figure it can cloud application developers to provide users with a rich,
be summarized that cloud computing is made of by personalized and various applications. This is the top level
applications, platforms and infrastructure. From a relevant of cloud computing services, and also is the most
literature, the current cloud computing industry chain profitable provider. Cloud resources service providers,
mainly includes 10 key components [5]: cloud platform providers and cloud application service
Hardware equipment supplier: is an active participant in providers can be called cloud service providers
the cloud computing market and infrastructure equipment collectively.
provider. It mainly includes: the server manufacturers, Network operators: provide ways access to the final
storage equipment manufacturers, chip makers and users for cloud computing service. The major network
embedded equipment manufacturers. operators are: telecom operators and mobile operators.
Cloud platform developers: provide related technologies Terminal vendors: according to the business needs of
and software to build and develope cloud computing cloud computing service providers, they provides
platform. customized or non-customized mobile or PC and many
System integrators: connect the hardware and software other types of terminals to meet the needs of users and the
facilities and provide solutions of cloud computing business development needs of cloud computing service
platform. This is to help users to build cloud computing providers.
software and hardware platform, especially the private End user: is the ultimate attribution of cloud services,
computing cloud of enterprise. the final part of the value chain. This mainly includes:
Cloud application developers: these parts provide business users, individual users and government users.
applications of software and solutions of cloud computing Combining the above ten key aspects and the three main
to the cloud application service provider. parts of cloud computing, this paper builds a relatively
Cloud resources service provider: access to hardware clearer and more complete industrial chain of cloud
resources from the equipment provider, and support computing based on the original theory, as shown in Fig. 2
software to generate resource pool by cloud computing, as below.
and achieve dynamic resource allocation. Also, it provides In order to adapt to the current social information
cloud platform service providers, application service security issues, the modified cloud industry chain is under
providers and cloud users with timely, stable, safe and the supervision of government or regulatory agency. And
smooth basic resources services. in order to promote the development of related industries,
Cloud platform services provider: provide flexible, this chain increases a test bed link [6]. Development of
general-purpose, scalable cloud computing platform test bed is to eliminate the financial and logistical barriers,
services to meet the users individual needs, but also promote open collaboration among industry, research
Supplement 2 XIE Xue-mei, et al. / Analysis on the risk of personal cloud computing based on the cloud industry chain 107

institutions and government departments and also carry out There are some different characteristics of personal
the research about the scope of Internet data-intensive cloud computing to ordinary cloud computing. Taking into
computing. account that main users of cloud computing is a company
or enterprise, this paper here takes enterprise as a general
user of cloud computing. The comparative analysis is
shown as below:
1) Characteristics
Personal users: individuals, families, vulnerable to
emotional stimuli.
Company or enterprise users: groups, more rational,
consideration of costs and benefits.
2) Motivation
Personal users: to work, entertainment, social sharing;
Company or enterprise users: for business.
Fig. 2 Modified structure of cloud computing industry chain 3) Requirement
Personal users: to store, backup, synchronize and
This chain is mainly composed of SaaS (SaaS: software
manage personal information at anytime or anywhere.
as a service), Paas (PaaS: platform-as-a-service), IaaS
Company or enterprise users: to reduce the costs of IT
(IaaS: Infrastructure as a service). The corresponding
equipment construction, operation and maintenance,
upstream are cloud application developers, cloud platform
rational use resources and for the pursuit of commercial
developers and hardware equipment providers. In
interests.
particular, the cloud platform developers need the help of
4) Points of concern
system integrators to make users to build a cloud
Personal users: word of mouth, the number of users,
computing software and hardware platform. About the
consistent experience, service availability, privacy
downstream part of the industry chain, cloud service
protection, price, ease of use.
providers access terminal vendors and then access to
Company or enterprise users: security, the operating
end-user by the support of network operators. All the links
experience of cloud service providers, the existing success
above should be under the supervision of government or
stories, cloud portability, data integration, and migration
regulatory agency in order to ensure the security and
costs.
privacy of the entire flow of information. Meanwhile, the
5) Main functions
test bed also covers this industrial chain to research the
Personal users: cloud storage, cloud notes.
scope of the Internet data-intensive computing to eliminate
Company or enterprise users: basic services, such as
the financial and logistical barriers, and promotes the open
development and testing services; common process
collaboration among industry, research institutions and
services, such as human resource (HR) and customer
government departments.
relationship management (CRM) services; industry
2.2 Construction of personal cloud computing industry services, such as industry process services, hospital
chain information system (HIS) of medical industry, picture
archiving and communication systems (PACS); enterprise
2.2.1 Characteristics of personal cloud computing specific services, like personalized services within the
enterprise.
Personal cloud computing has some general 6) When
characteristics as cloud computing, such as sharing, Personal users: any time, more fragmentation.
random access, and scalability. Personal information is not Company or enterprise users: working hours.
only for their own use, but also for relatives, friends or 7) Where
public in order to achieve its social value. Also, people can Personal users: home, companies, journey and any other
get access to personal information at anytime, anywhere location.
by any form of network terminals. Company or enterprise users: company.
108 The Journal of China Universities of Posts and Telecommunications 2013

As we can see, this paper carries out a comparison does a preliminary risk perception base on the personal
between two kinds of users in 7 aspects. From above it cloud industry chain firstly. It makes a brainstorming
shows that the difference between personal cloud among the most promising college students and also gains
computing and ordinary cloud computing is obvious. The the broad mass acceptance by the personal computing
most important one is about the functions or services cloud users, which is based on initially proposed risk
which are mainly used by the users. In personal cloud factors of personal cloud computing. Based on the
computing, users will not have or have little contact to potential risk factors identified above, this paper classifies
PaaS or IaaS. PaaS and IaaS are the support link to SaaS. those risk factors into three categories according to their
natures, which are policy and organizational risk,
2.2.2 Analysis of personal cloud computing chain technological risk and legal risk. Finally we make the
related survey questions according to these different risks.
According to the above analysis, this paper builds a Due to personal cloud industry chain contains many
structure of personal cloud industry chain on the basis of links and has a wide span, this paper focuses on the impact
modified cloud computing industry chain as shown in study of the risk of personal cloud computing to the end
Fig. 3: users. Thus the risk analysis is mainly about the
downstream industry chain, which mainly points to the end
user of cloud computing. And this paper summarizes the
important risk factors which affect the development of
personal cloud computing by the survey of individual users
risk perception [7], in order to make a risk response plan
and policy recommendations to promote the popularity of
personal cloud computing and support its development.
By sorting the results of risk perception from the
downstream individual users to the middle personal
cloud computing service providers, all kinds of potential
risk [8] factors are shown in below:
Fig. 3 Structure of personal cloud computing industry chain 1) The risks among individual users, such as: users are
The key of personal cloud computing industry chain is lack of information security awareness, lose control of
the midstream industry areas, which is the personal cloud physical security in personal cloud.
computing service providers. To be specific, it is the SaaS 2) The risks among network carriers, such as: hardware
providers. The part linked to the downstream is also SaaS. and software of the network system, and data in the system,
The main responsibility of PaaS and IaaS is to support large-scale botnet denial of service attack distributed
SaaS. And they would not contact the individual users denial of service (DDOS), vulnerabilities, Trojans and
directly. There are two types for SaaS service, personal other malicious program intrusions.
storage services and personal information management 3) The risks among terminal vendors, such as: attacks by
service. the Trojan, virus, resulting in the loss and disclosure of
user information.
3 Risk management based on personal cloud 4) The risks among personal cloud computing service
industry chain providers, such as: equipment safety risks, malicious
internal staff risks, internal staff risks without malice [9],
3.1 Risk identification and analysis
data residual risks [10], security vulnerabilities of cloud
3.1.1 Method for risk identification and results application.
The survey takes online and offline two methods. The
Risk identified refers to understanding the various risks main respondent is Beijing college student. There are 120
faced and analyze their underlying causes by various valid questionnaires in total. The survey is made from the
methods before an accident occurs. perspective of individual users of cloud computing to
As the limited resources of the investigation, this paper measure the degree of risk factors in the individual
Supplement 2 XIE Xue-mei, et al. / Analysis on the risk of personal cloud computing based on the cloud industry chain 109

perception aspect. risk and catastrophic risk. The number means how many
The design ideas of questionnaire is identifying the risks people choose this level in the persons being investigated,
and measuring the degree. Thus the risk factors option and the one in the bracket means the percentage. The result
from low to high is divided into six levels, they are on-risk is shown in Tables 13:
factors, slight risk, ordinary risk, serious risk, significant
Table 1 Results of personal cloud computing potential risk factors-part 1
Risk level
Topic Non-risk Slight risk Ordinary Serious Significant Catastrophic
(0) (1) risk (2) risk (3) risk (4) risk (5)
1. Cloud service providers do not
have a good adherence to various
3(2.5%) 15(12.5%) 24(20%) 39(32.5%) 30(25%) 9(7.5%)
terms of service, such as privacy
protection terms.
2. When you replace the personal
cloud service provider, your
3(2.5%) 12(10%) 42(35%) 33(27.5%) 18(15%) 12(10%)
personal data may not be migrated
to the new one completely.
I policy and 3. It is inevitable that the providers
organizational would have the rights to manage
3(2.5%) 6(5%) 36(30%) 33(27.5%) 36(30%) 6(5%)
aspect your personal data, which may
cause some security problems.
4. There is no clear institutions to
supervise cloud service providers,
3(2.5%) 6(5%) 42(35%) 27(22.5%) 30(25%) 12(10%)
thus there is a certain risk in using
personal cloud computing.
5. Nonstandard operation of
personal cloud computing service 0(0%) 27(22.5%) 24(20%) 42(35%) 21(17.5%) 6(5%)
providers may have risks.
6. The relevant management staff
of personal cloud service providers
0(0%) 3(2.5%) 27(22.5%) 33(27.5%) 42(35%) 15(12.5%)
may carry out malicious actions of
personal data.

Table 2 Results of personal cloud computing potential risk factors-part 2


Risk level
Topic Slight Ordinary Serious Significant Catastrophic
Non-risk (0)
risk (1) risk (2) risk (3) risk (4) risk (5)
1. A lot of personal data storing in
the same public cloud could bring 9(7.5%) 18(15%) 39(32.5%) 27(22.5%) 24(20%) 3(2.5%)
confusion or read errors.
2. Insecurity such as viruses or
hacker attacks, causing public 6(5%) 21(17.5%) 33(27.5%) 15(12.5%) 27(22.5%) 18(15%)
service stops or data loss.
3. You do not know the effective
save time of information when your
personal data is uploaded to a 0(0%) 24(20%) 42(35%) 30(25%) 21(17.5%) 3(2.5%)
public server, which may cause data
loss.
4. There may be a risk of data
II leakage when personal data is 0(0%) 15(12.5%) 30(25%) 30(25%) 42(35%) 3(2.5%)
technology uploaded to a public server.
aspect 5. The information may be
transferred unknowingly when
0(0%) 3(2.5%) 27(22.5%) 57(47.5%) 30(25%) 3(2.5%)
personal data is uploaded to a
public server.
6. Personal data cannot be
completely removed from a public
0(0%) 3(2.5%) 24(20%) 45(37.5%) 42(35%) 6(5%)
server timely in accordance with
your wishes.
7. In the use of personal cloud
services, you cannot get the
relevant notifications timely when 0(0%) 12(10%) 9(7.5%) 45(37.5%) 42(35%) 12(10%)
suffered invasion of privacy or data
leaks.
8. Once the data center failure will
cause the service to stop or data loss 3(2.5%) 15(12.5%) 21(17.5%) 36(30%) 24(20%) 21(17.5%)
and other risks.
110 The Journal of China Universities of Posts and Telecommunications 2013

Table 3 Results of personal cloud computing potential risk factors-part 3


Risk level
Topic Non-risk Slight ordinary Serious Significant Catastrophic
(0) risk (1) risk (2) risk (3) risk (4) risk (5)
1. You do not know if it is legal
about the behavior of cloud service 0(0%) 6(5%) 42(35%) 27(22.5%) 30(25%) 15(12.5%)
providers data processing.
2. There are no targeted agencies to
III Legal help you solve the problems
aspect quickly and effectively when you 0(0%) 12(10%) 15(12.5%) 30(25%) 39(32.5%) 24(20%)
use personal cloud computing
(such as tort issues).
3. Current regulations of personal
cloud computing is not perfect,
which may cause risks in 0(0%) 12(10%) 12(10%) 30(25%) 33(27.5%) 33(27.5%)
supervision or restraint cloud
service providers behavior.

3.1.2 Risk analysis point 0 to 5 to get an weighted average scores. The


severity of risk factors is shown in descending order in
Risk analysis is the evaluation and measurement of the Table 4:
impact of the risks. This paper measures risk degree by
qualitative analysis method. The risk level is assigned by
Table 4 Results of personal cloud computing risk identification (descending)
No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Category           
Topic 3 2 6 7 6 8 1 5 3 4 4 1 2 2 5 3 1
Average 3.53 3.4 3.33 3.28 3.2 3.05 3.05 3.03 2.93 2.93 2.9 2.88 2.75 2.73 2.63 2.48 2.4
Note: Category / Topic in Table 4 corresponds to Tables 13

The result shows that the average scores of risk factors This paper develops a risk response plan based on the
investigated are 2 points or more. It can explain the 17 above formulation of ideas. According to risk
identified risk factors are potential risks for personal cloud identification and analysis, the response plan is shown as
computing users, and they all belong to the level of below and category/topic from following item 1) to 17) are
ordinary risks and above. Some of them, eight risk factors corresponds to Tables 13:
scores are 3 points or more, which belong to the level of 1) As for category topic 3, about the link of
significant risks and above. government or regulatory agency, the response plan is:
According to the risk category, the risks related to legal strengthen the construction of laws and regulations,
aspects are ranked in the front in Table 4, which means the especially for personal cloud computing, while focusing on
users pay more attention to this aspect. In conclusion, legal the popularity after completion.
aspect is the key for the development of personal cloud 2) As for category topic 2, about the link of
computing in China. In the aspect of policy and government or regulatory agency, the response plan is:
organizational risk and technical risk, it shows that the establish the appropriate third-party agency or organization
risks of these two types are intertwined in the sort and for potential privacy and security issues of personal cloud
there is no obvious distinction of severities in them. computing.
3) As for category topic 6, about the link of personal
3.2 Risk monitoring and response cloud computing providers, the response plan is: related
services organization has to develop some industry
Risk response plan is for the identified risks. The regulations to control the behavior of employees, but also
purpose of the plan is to develop and make a risk response the government needs to increase the binding strength by
plan according to the project risk. The purpose is to control building related laws.
the potential risk factors and improves the achievement 4) As for category topic 8, about the link of personal
objectives of project. Risk control strategies are accepting, cloud computing providers, the response plan is: any
avoiding, and mitigating and transferring the risks. personal cloud service providers ensure that privacy
Supplement 2 XIE Xue-mei, et al. / Analysis on the risk of personal cloud computing based on the cloud industry chain 111

protection and remedies in the development of their own operators, the response plan is: enhance network security
products, otherwise they will not be granted operating building, and also the government needs to building
privileges. related laws to protect the security of personal information.
5) As for category topic 7, about the link of personal 14) As for category topic 2, about the link of
cloud computing providers, the response plan is: related personal cloud computing providers, the response plan is:
services organization has to develop some industry cloud service providers need to strengthen the construction
regulations to control the behavior of cloud computing of the data migration, and build bridges of cooperation to
providers, but also the government needs to increase the facilitate data transmission integrity between different
binding strength by building related laws. cloud services providers can build.
6) As for category topic 9, about the link of cloud 15) As for category topic 5, about the link of
infrastructure providers and network operators, the personal cloud computing providers, the response plan is:
response plan is: enhance cloud infrastructure, including related services organization has to develop some industry
building the servers and network security. regulations to control the behavior of cloud computing
7) As for category topic 1 about the link of personal providers, but also the government needs to increase the
cloud computing providers, the response plan is: binding strength by building related laws.
strengthen the industry laws and service regulations 16) As for category topic 3, about the link of
building. personal cloud computing providers and end users, the
8) As for category topic 5 about the link of personal response plan is: cloud service providers need to explain
cloud computing providers and network operators, the more about the instructions details, and data need the
response plan is: related services organization has to user's confirmation before being cleared. While users also
develop some industry regulations to control the behavior need to read related regulations carefully before using.
of cloud computing providers and network operators, but 17) As for category topic 1, about the link of cloud
also the government needs to increase the binding strength infrastructure providers and personal cloud computing
by building related laws. providers, the response plan is: strengthen public cloud
9) As for category topic 3, about the link of personal infrastructure while other various cloud service providers
cloud computing providers, the response plan is: related need to enhance their own data processing and service
services organization has to develop some industry levels.
regulations to control the behavior of cloud computing
providers, but also the government needs to increase the 4 Suggestions and regulatory strategy
binding strength by building related laws.
10) As for category topic 3, about the link of Since we have identified the above risk factors of cloud
government or regulatory agency, the response plan is: set computing, in order to further promote the implementation
up a professional monitoring organization for personal of risk response plans, the most urgent thing currently is to
cloud industry chain. improve the existing regulatory system. This paper
11) As for category topic 4, about the link of suggests the following recommendations to cope with the
personal cloud computing providers and network operators, most serious ten identified risks:
the response plan is: related services organization has to 1) Make clear the regulatory authorities of cloud
develop some industry regulations to control each link of computing industry, and strengthen the coordination of
the industry chain, but also the government needs to regulatory agencies.
increase the binding strength by building related laws. At present, a number of departments have been take part
12) As for category topic 1, about the link of in the regulation of network information security. The
personal cloud computing providers, the response plan is: administrative supervision system has been basically
related services organization has to develop some industry formed. To implement monitoring effectively, there are
regulations to control the behavior of cloud computing two conditions: first is to set the monitoring points and the
providers, but also the government needs to increase the second is using the reasonable administrative methods.
binding strength by building related laws. Either of them can supervise, but take both of them to
13) As for category topic 2, about the link of network attain the effective supervision.
112 The Journal of China Universities of Posts and Telecommunications 2013

Explosive growth of cloud computing currently prompts cloud service providers have priority access to the data
us that cloud security is a monitoring point, should rather than the users. Such situation brings a great threat to
undoubtedly establish targeted agencies or departments. privacy and security and becomes the biggest obstacle for
Especially when personal cloud is developing so fast day development of cloud computing. When the government is
by day, the security issues of personal information will be committed to improve the relevant laws and regulations,
increased correspondingly. Only when the regulatory cloud service providers also need to optimize solutions to
authorities cooperate with each other and give full play to weaken this risk by establishing a credible processing
their respective regulatory roles, personal cloud industry environment though the data lifecycle. In other words, the
would get a healthy development. Due to complexity and terms of service for personal cloud computing should be as
extensiveness of supervision, any of the regulatory detailed as possible and to be more specifically. It is better
resources or the departments is limited. Therefore, in the to conclude every link of the information flowing, such as
transverse direction for cloud security should establish and the privacy data creation, storage, use and destruction. In
build the information communication mechanism in particular, it is necessary to ensure avoiding of a
different aspects. And in the longitudinal direction, it is non-normal transmission and total destruction of the
necessary to build information circulation system among information.
various government departments to achieve the regional 4) Make relevant policies to promote the development
cooperation and coordination. of personal cloud computing effectively
2) Strengthen legislation direction to improve the This is an initial and critical period for the development
enforcement of laws of personal cloud computing. From the national strategic
Cloud security needs complete, operable, external policy level, it is an important time to build the personal cloud
and legal environment, but also needs the existing legal computing development plan, to define the development
regulation as a precondition to restrict it. Adjustments and models and technical standards of personal cloud
addition of the existing legislation and laws to cloud computing, to determine the development route, and also
security are very important. Cloud security legislation in effectively promote the development of personal cloud
China is applicable in criminal, civil and administrative computing [12].
fields, covering national security, personal privacy, At the same time, the government can take this
cross-border services, law enforcement forensics and also opportunity to encourage the various cloud providers to
the domains of intellectual property legal risk. Although strengthen infrastructure and process specifications. In
legislative level is clear and specific but the provision in particular, the government needs to clearly point out that
security areas is not perfect. In different risk domains, the the providers must inform users as soon as possible once
legislation should be focused differently according to the information is leaked. No concealment or deception
objectives of cloud computing security. phenomenon should be allowed in case it may bring users
According to the investigation, it is necessary to greater harm.
strengthen legislation to control cloud service providers, to
prevent irregularities or malicious behavior. And because Acknowledgements
of the intellectual property and monitoring legislation is
relatively weak in China, with the development of cloud This work was supported by the Communication Soft Science
computing and kinds of terminal access, the quick spread Projects of MIIT in 2012, Research on Information Security
of personal information is ineluctable. The government Supervision Policy of Personal Cloud Computing Services.
must make it clear to the service providers that relevant
References
providers should take responsibility for their action once
the information disclosure happened of the cloud users and 1. Zheng YJiang WJiang T F. Research on security framework for personal
might even face tougher legal sanctions [11]. cloud computing. Net INFO SECURITY. (12) 2011: 7275 (in Chinese)
3) Build relevant industry standards, give full play to the 2. Na S H, Park J Y, Huh E N. Personal cloud computing security framework.
IEEE Asia-Pacific Services Computing Conference, 2010: 671675
part of social institutions 3. Liu P. Personal Cloud Computing. Technology Review. 2011 (in Chinese)
After uploading personal data, the data control right
transferred to cloud service providers from users. The To p. 127
Supplement 2 LI Bo, et al. / Critical phenomenon of two coupled phase oscillators 127

Bosonic Josephson Junctions. Chin. Phys. Lett. 2010, 27: 070501 curvature. Phys. Rev. E, 1999, 60: R6279-R6282
9. Wang X G, Zhang M, Lai C H, et al. Measure synchronization in coupled 12. Cheb-Terrab E S, de Oliveira H P. Poincar sections of Hamiltonian systems.
4 Hamiltonian systems. Phys. Rev. E, 2003, 67: 066215 Computer Physics Communications, 1996, 95: 171189
10. Wang X G, Zhang Y, Hu G. Controlling Hamiltonian system by using 13. Huynh H N, Chew L C. Two-coupled pendulum system: bifurcation, chaos
measure synchronization. Physics Letters A, 2002, 298: 383387 and the potential landscape approach. Int. J. Bifurcation Chaos, 2010, 20(8):
11. Oloum A, Teychenne D. Controlling Hamiltonian chaos via Gaussian 24272432

From p. 112 2010: 368372


8. European Network and information Security Agency. Cloud Computing-
4. Luo Z G, Qian L, Sun H W. Cloud computing and the development of Benefits, Risks and Recommendations for Information Security, 2009
industry chain. 2010 (Fourth) International Symposium on Mobile Internet. 9. Svantesson D, Clarke R. Privacy and customer risks in cloud computing.
2010: 2528 (in Chinese) Elsevier Ltd, Langford Lane, Kidlington, Oxford, OX5 1GB, United
5. Beijing NuoDa Consulting Co., Ltd. Cloud Computing Industry Chain Kingdom. 2010: 391397
Research Report 2011 basic version. Jan, 2011 (in Chinese) 10. Tim M, Subra K, Shahed L. Cloud security and privacy. China Machine
6. Fang B Y, Zhang Y Y, Cheng Y. Analysis in the present and developing Press, 2011: 143163 (in Chinese)
status of cloud computing. Telecommunications Science. (8A). 2010: 15 11. Cloud Computing Security Policies and Laws Group. Blue Book of China
(in Chinese) Cloud Computing Security Policies and Laws. 2012 (in Chinese)
7. Rohit R, Bharat B, Othmane L B. Protection of identity information 12. Mowbray M, Pearson S, Shen Y. Enhancing privacy in cloud computing via
in cloud computing without trusted third party. IEEE Computer Society, 445 policy-based obfuscation. Springer Netherlands, Van Godewijckstraat 30,
Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States. Dordrecht, 3311 GZ, Netherlands, 2012: 267291

Das könnte Ihnen auch gefallen