Results 61 to 70 of about 751,340 (235)

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing [PDF]

open access: yesarXiv, 2019
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees ...
arxiv  

Cloud Computing Security and Privacy [PDF]

open access: yesComputer Science and Information Technology, 2014
The cloud computing paradigm is still evolving, but has recently gained tremendous momentum. However, security and privacy issues pose as the key roadblock to its fast adoption. In this paper we present security and privacy challenges that are exacerbated by the unique aspects of clouds and show how they're related to various delivery and deployment ...
openaire   +2 more sources

Security and Privacy in Fog Computing: Challenges

open access: yesIEEE Access, 2017
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of
Mithun Mukherjee   +6 more
doaj   +1 more source

Cloud Security Architecture and Implementation - A practical approach [PDF]

open access: yesarXiv, 2018
While cloud computing provides lower Infrastructure cost, higher agility and faster delivery, it also presents higher operational and security risks for business critical assets, but a well-designed solution and security architecture will keep businesses safe during and after migrating their assets to the cloud. This paper has researched and identified
arxiv  

Network Security Threats and Countermeasures on Cloud Computing

open access: yesDianxin kexue, 2013
Cloud computing is a new concept of providing virtualized resources to the consumers.Consumers can request a cloud for services,applications,solution and can store large amount of data in different locations.But with the growing popularity of cloud ...
Ping Yao, Hong Li
doaj   +2 more sources

Data Security and Privacy in Cloud Computing

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun   +3 more
doaj   +1 more source

A Survey on Cloud Computing Security [PDF]

open access: yesarXiv, 2012
Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products.
arxiv  

Secure Cloud Communication for Effective Cost Management System through MSBE [PDF]

open access: yes, 2012
In Cloud Computing Architecture, Brokers are responsible to provide services to the end users. An Effective Cost Management System (ECMS) which works over Secure Cloud Communication Paradigm (SCCP) helps in finding a communication link with overall minimum cost of links. We propose an improved Broker Cloud Communication Paradigm (BCCP) with integration
arxiv   +1 more source

Is Cloud Computing Steganography-proof? [PDF]

open access: yesarXiv, 2011
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms ...
arxiv  

Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques [PDF]

open access: yes, 2016
In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data.
arxiv   +1 more source

Home - About - Disclaimer - Privacy