Results 311 to 320 of about 502,338 (367)

Cloud Computing Security [PDF]

open access: possibleInternational Journal of Ambient Computing and Intelligence, 2011
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire   +1 more source

Security in Cloud Computing [PDF]

open access: possible2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 2018
From the past few years Cloud Computing has become the IT industry's landscape for both the individuals and companies from the way to access which stores and also shares the information to how we communicate, collaborate and process the data. In companies, many clients worry about their resources whether it is outside the firewall.
Rishitha, T. R. Reshmi
openaire   +1 more source

Secure virtualization for cloud computing

Journal of Network and Computer Applications, 2011
Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire   +4 more sources

Security in cloud computing

2017 7th International Conference on Communication Systems and Network Technologies (CSNT), 2017
Cloud computing has manifold advantages and thus it is now considered as the best computing environment nowadays. It provides a plethora of benefits such as pay per use services, infrastructure etc. Cloud computing paradigm offers scalability. Along with this, it also provides flexibility, ease of computing, economic benefits and what not.
Mohammed Abdul Qadeer   +3 more
openaire   +2 more sources

Security by Design for Big Data Frameworks Over Cloud Computing

IEEE transactions on engineering management, 2021
Cloud deployment architectures have become a preferable computation model of Big Data (BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend.
Feras M. Awaysheh   +5 more
semanticscholar   +1 more source

A Secure Cloud Computing

2010 International Conference on Recent Trends in Information, Telecommunication and Computing, 2010
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc ...
Gadadhar Sahoo, Kuntal Mukherjee
openaire   +2 more sources

Securing Cloud Computing

SSRN Electronic Journal, 2011
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive
openaire   +2 more sources

On Cloud Computing Security

2011
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire   +2 more sources

Secure Cloud Computing

2014
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee   +2 more
openaire   +2 more sources

Cloud Computing Security

2018
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire   +2 more sources

Home - About - Disclaimer - Privacy