Results 71 to 80 of about 751,340 (235)

Cloud computing and cloud security in China [PDF]

open access: yesAIP Conference Proceedings, 2018
We live in the data age. It’s not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the “digital universe” at 0.18 zettabytes in 2006 and is forecasting a tenfold growth by 2011 to 1.8 zettabytes. A zettabyte is 1021 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion ...
Cuenyun Jiang, Shaohe Zhang, Ruxin Wang
openaire   +2 more sources

Security research of Internet of Things based on cloud computing

open access: yesGong-kuang zidonghua, 2013
The paper introduced concepts of cloud computing and Internet of Things, analyzed inevitability and combination mode of the cloud computing and the Internet of Things.
NIE Xiao
doaj  

Proposal for a Security Management in Cloud Computing for Health Care

open access: yesThe Scientific World Journal, 2014
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in ...
Knut Haufe, Srdan Dzombeta, Knud Brandis
doaj   +1 more source

NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security [PDF]

open access: yesarXiv, 2014
Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security.
arxiv  

An insider user authentication method based on improved temporal convolutional network

open access: yesHigh-Confidence Computing, 2023
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao   +4 more
doaj  

A Framework for Cloud Security Risk Management Based on the Business Objectives of Organizations [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications(IJACSA), Vol.10, No.12, pp. 186-194,2019, 2020
Security is considered one of the top ranked risks of Cloud Computing (CC) due to the outsourcing of sensitive data onto a third party. In addition, the complexity of the cloud model results in a large number of heterogeneous security controls that must be consistently managed.
arxiv  

SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH

open access: yesTASK Quarterly, 2013
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj  

An Analysis of the Cloud Computing Security Problem [PDF]

open access: yesarXiv, 2016
Cloud computing is a new computational paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption.
arxiv  

Ensuring data storage security in Cloud Computing [PDF]

open access: green, 2009
Cong Wang   +3 more
openalex   +1 more source

Emerging Security Challenges of Cloud Virtual Infrastructure [PDF]

open access: yesarXiv, 2016
The cloud computing model is rapidly transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet-based services allowing customers to remotely run and manage these services. Infrastructure-as-a-service (IaaS) is one of the popular cloud computing services.
arxiv  

Home - About - Disclaimer - Privacy