Results 71 to 80 of about 751,340 (235)
Cloud computing and cloud security in China [PDF]
We live in the data age. It’s not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the “digital universe” at 0.18 zettabytes in 2006 and is forecasting a tenfold growth by 2011 to 1.8 zettabytes. A zettabyte is 1021 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion ...
Cuenyun Jiang, Shaohe Zhang, Ruxin Wang
openaire +2 more sources
Security research of Internet of Things based on cloud computing
The paper introduced concepts of cloud computing and Internet of Things, analyzed inevitability and combination mode of the cloud computing and the Internet of Things.
NIE Xiao
doaj
Proposal for a Security Management in Cloud Computing for Health Care
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in ...
Knut Haufe, Srdan Dzombeta, Knud Brandis
doaj +1 more source
NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security [PDF]
Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security.
arxiv
An insider user authentication method based on improved temporal convolutional network
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao+4 more
doaj
A Framework for Cloud Security Risk Management Based on the Business Objectives of Organizations [PDF]
Security is considered one of the top ranked risks of Cloud Computing (CC) due to the outsourcing of sensitive data onto a third party. In addition, the complexity of the cloud model results in a large number of heterogeneous security controls that must be consistently managed.
arxiv
SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj
An Analysis of the Cloud Computing Security Problem [PDF]
Cloud computing is a new computational paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption.
arxiv
Ensuring data storage security in Cloud Computing [PDF]
Cong Wang+3 more
openalex +1 more source
Emerging Security Challenges of Cloud Virtual Infrastructure [PDF]
The cloud computing model is rapidly transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet-based services allowing customers to remotely run and manage these services. Infrastructure-as-a-service (IaaS) is one of the popular cloud computing services.
arxiv