Results 81 to 90 of about 751,340 (235)
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing [PDF]
Cong Wang+3 more
openalex +1 more source
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [PDF]
Qian Wang+4 more
openalex +1 more source
An Automated Security Analysis Framework and Implementation for Cloud [PDF]
Cloud service providers offer their customers with on-demand and cost-effective services, scalable computing, and network infrastructures. Enterprises migrate their services to the cloud to utilize the benefit of cloud computing such as eliminating the capital expense of their computing need. There are security vulnerabilities and threats in the cloud.
arxiv
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, complex ...
Haifeng Lin+3 more
doaj
Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach
Cloud computing services bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboration ...
Ludger Goeke+2 more
doaj +1 more source
Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience, or even authority that provides such services ...
Fursan Thabit+4 more
doaj
REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS [PDF]
A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit.
Varun Varma Sangaraju +4 more
doaj +1 more source
Data Migration among Different Clouds [PDF]
Cloud computing services are becoming more and more popular. However, the high concentration of data and services on the clouds make them attractive targets for various security attacks, including DoS, data theft, and privacy attacks. Additionally, cloud providers may fail to comply with service level agreement in terms of performance, availability ...
arxiv
SecLaaS: Secure Logging-as-a-Service for Cloud Forensics [PDF]
Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. Analyzing various logs (e.g., process logs, network logs) plays a vital role in computer forensics.
arxiv
Today, despite many benefits of cloud computing technology, including cost savings, agility, increased flexibility and scalability the issue of information security is the main obstacle to the tendency of organizations towards cloud computing.
Mehdi Soltanifar, Seyed Mohammad Zargar
doaj