fullrecord |
[{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.advisor", "value": "Palonen, Teija", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "\u00c4n\u00e4kk\u00e4l\u00e4, Tuomas", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-03-26T14:24:47Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-03-26T14:24:47Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/53368", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Pilvilaskennalla viitataan hajautetun laskennan malliin, jossa laskentaresursseja tarjotaan Internetin v\u00e4lityksell\u00e4 palveluina. N\u00e4m\u00e4 laskentaresurssit voidaan tarjota nopeaa, tarpeen vaatiessa sek\u00e4 minimaalisella palveluntarjoajan vuorovaikutuksella. Pilvilaskentaa pidet\u00e4\u00e4n vakuuttavana mallina, sill\u00e4 se tarjoaa tehokkaita resursseja alhaisilla kustannuksilla. Pilvilaskennasta on muodostunut yksi IT-alan nopeimmin kasvavista segmenteist\u00e4. Pilvilaskennan turvallisuuteen liittyy kuitenkin paljon ep\u00e4selvyytt\u00e4. Turvallisuuden hallitseminen pilviymp\u00e4rist\u00f6ss\u00e4 ei ole poikkeavaa tavallisesta IT-ymp\u00e4rist\u00f6st\u00e4, mutta tavalliset turvallisuuskeinot eiv\u00e4t ole pilviymp\u00e4rist\u00f6ss\u00e4 riitt\u00e4vi\u00e4. Pilvilaskennan k\u00e4ytt\u00e4j\u00e4t hy\u00f6tyv\u00e4t matalista k\u00e4ytt\u00f6kustannuksista, mutta altistuvat samalla uusille turvallisuusuhille. T\u00e4m\u00e4n kirjallisuuskatsauksen tarkoituksena oli selvitt\u00e4\u00e4, millaisia tietoturvaongelmia pilvilaskennan palvelumalleihin liittyy. Kirjallisuuskatsauksessa selvitettiin my\u00f6s, millaisia uhkia pilvilaskenta muodostaa datan luotettavuudelle, eheydelle sek\u00e4 saatavuudelle. Tutkielman keskeisin l\u00f6yd\u00f6s osoitti pilvilaskentaan liittyv\u00e4n merkitt\u00e4vi\u00e4 turvallisuusongelmia, jotka vaihtelevat muun muassa palvelumalleittain. Turvallisuusongelmat ja dataan kohdistuvat uhat aiheutuvat pilvilaskennan p\u00e4\u00e4piirteist\u00e4 sek\u00e4 k\u00e4ytetyist\u00e4 teknologioista", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cloud computing refers to distributed computing paradigm, in which computing resources are delivered over the Internet as services. These resources can be delivered rapidly, on demand and with minimal service provider interaction. Cloud computing is a convincing concept, as it offers powerful resources with low costs. Cloud computing has emerged to be one of the most rapidly increasing segments in IT-industry. There is plenty of uncertainty related to cloud computing security. Security governance in cloud environment is no different than security governance in traditional IT-systems, but traditional security measures aren\u2019t sufficient in cloud environment. Cloud computing users can benefit from low costs, but at the same time they are exposed to new security threats. Purpose of this literature review was to find out which kind of security issues concern cloud computing service models. This literature review also clarifies which threats does cloud computing pose to confidentiality, integrity, and availability of data. Key finding of the study was that there are many security issues related to cloud computing, which vary depending on the service model. Security issues and threats to data originate from key characteristics and technologies of cloud computing", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Tuomas \u00c4n\u00e4kk\u00e4l\u00e4 (tutaanak) on 2017-03-26 14:24:46.491599. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-03-26T14:24:47Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201703261756.pdf: 481845 bytes, checksum: 13bb8db8563da830aea3baf69c377a7d (MD5)\nlicense.html: 4788 bytes, checksum: a48732b52010a686b8227eecdecf4e43 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-03-26T14:24:47Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201703261756.pdf: 481845 bytes, checksum: 13bb8db8563da830aea3baf69c377a7d (MD5)\nlicense.html: 4788 bytes, checksum: a48732b52010a686b8227eecdecf4e43 (MD5)\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "34", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "pilvilaskenta", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "pilvipalvelu", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "palvelumalli", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuusongelma", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "turvallisuusuhka", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Pilvilaskennan tietoturvaongelmat", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201703261756", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-03-26T14:24:48Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|