Results 311 to 320 of about 502,338 (367)
Cloud Computing Security [PDF]
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire +1 more source
Security in Cloud Computing [PDF]
From the past few years Cloud Computing has become the IT industry's landscape for both the individuals and companies from the way to access which stores and also shares the information to how we communicate, collaborate and process the data. In companies, many clients worry about their resources whether it is outside the firewall.
Rishitha, T. R. Reshmi
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Secure virtualization for cloud computing
Journal of Network and Computer Applications, 2011Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire +4 more sources
2017 7th International Conference on Communication Systems and Network Technologies (CSNT), 2017
Cloud computing has manifold advantages and thus it is now considered as the best computing environment nowadays. It provides a plethora of benefits such as pay per use services, infrastructure etc. Cloud computing paradigm offers scalability. Along with this, it also provides flexibility, ease of computing, economic benefits and what not.
Mohammed Abdul Qadeer +3 more
openaire +2 more sources
Cloud computing has manifold advantages and thus it is now considered as the best computing environment nowadays. It provides a plethora of benefits such as pay per use services, infrastructure etc. Cloud computing paradigm offers scalability. Along with this, it also provides flexibility, ease of computing, economic benefits and what not.
Mohammed Abdul Qadeer +3 more
openaire +2 more sources
Security by Design for Big Data Frameworks Over Cloud Computing
IEEE transactions on engineering management, 2021Cloud deployment architectures have become a preferable computation model of Big Data (BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend.
Feras M. Awaysheh +5 more
semanticscholar +1 more source
2010 International Conference on Recent Trends in Information, Telecommunication and Computing, 2010
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc ...
Gadadhar Sahoo, Kuntal Mukherjee
openaire +2 more sources
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc ...
Gadadhar Sahoo, Kuntal Mukherjee
openaire +2 more sources
SSRN Electronic Journal, 2011
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive
openaire +2 more sources
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive
openaire +2 more sources
2011
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire +2 more sources
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire +2 more sources
2014
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee +2 more
openaire +2 more sources
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee +2 more
openaire +2 more sources
2018
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire +2 more sources
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire +2 more sources

