A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures
[chapter]
2013
Lecture Notes in Computer Science
The idea is to spread and embed Secure Elements (SE) on each level of the Cloud in order to make a wide trusted infrastructure which complies with access control and isolation policies. ...
The aim of this article is then to propose a way to build a secure and trustable Cloud. ...
With the NoSE, each Secure Element represents locally the minimal TCB to implement security function and the interconnection of SE makes the minimal TCB for a trusted service on a Cloud infrastructure. ...
doi:10.1007/978-3-642-38082-2_13
fatcat:4x77ikk5h5dyfo6bgcvjwxjgzq
A Cloud Security Framework Based on Trust Model and Mobile Agent
[article]
2020
arXiv
pre-print
The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. ...
To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. ...
cloud service provider site, carrying with it user's, domain's identification and the encrypted request. STEP 7: the MA when arrived at CSP's site, it establishes a secure SSL connection with Proxy Agent ...
arXiv:2001.09090v1
fatcat:v4dwaezy3jeddf7lha2pirhgye
D2i2D: A Novel Secure Approach for Cloud Storage with Cost Minimization
2016
Journal of Software
Our technique is based on data to RGB image and RGB image to data conversion technique with multiple-key-cryptography (MKC) to provide more security on cloud data. ...
Then we propose a novel data hiding approach called 'D2i2D' which is able to provide security to any data stored in the cloud as well as reduce the file size in cloud storage. ...
Trusted Security Provider for Encryption In our framework trusted security provider (TSP) may be cloud service provider itself or third-party security provider. ...
doi:10.17706/jsw.11.8.787-802
fatcat:aogqg262dvbpbgen3in2jnxuda
Key Security Issues and Existing Solutions in Cloud Computing Applications
2017
Indian Journal of Science and Technology
Security is still an un resolved problem in cloud applications.In this paper, we present the key issues of data security in the cloud computing technology , and are described in four areas: storage security ...
, network security, data security and virtualization. ...
Thus, the cloud consumers and providers should be presented with a standard means for stating their security requirements and capabilities. ...
doi:10.17485/ijst/2017/v10i19/111016
fatcat:bnbztmqodnahfjlfva7ixeucoq
A Security Assessment Framework and Selection Method for Outsourcing Cloud Service
2014
International Journal of Security and Its Applications
To solve the fears and deal with the threats associated with outsourcing, new method for selection of outsourcing cloud service providers(CSP) based on assessment of security and performance is urgently ...
CSP based on security weight, meanwhile minimize the business cost. ...
In order to achieve offering on-demand and scalable service manner, the cloud organization need some cloud service provider to apply some specific minimal services. ...
doi:10.14257/ijsia.2014.8.6.32
fatcat:6r4wdoph7be5jbpqci5vegn5ym
Security and Privacy Issues in Cloud Computing Environment: A Survey Paper
2014
International Journal of Grid and Distributed Computing
Cloud computing is emerging as a powerful architecture to perform large-scale and complex computing. ...
This paper surveys and evaluates the architecture, data security and privacy issues in cloud computing like data confidentiality, integrity, authentication, trust, service level agreements and regulatory ...
The cloud provider should share all such concerns with the client and a build trust relationship in this connection. ...
doi:10.14257/ijgdc.2014.7.2.09
fatcat:xgfjlcyqlzbszbo4o36zgdfqxe
CLOUD COMPUTING: MAJOR CHALLENGES AND COUNTER ACTS
2018
International Journal of Advanced Research in Computer Science
and trust issues with Cloud subscribers. ...
This paper provides state of the art of major security challenges in the cloud paradigm and the countermeasures to counteract with the security breaches. ...
So, to attain the motivation of providing a secure and trusted cloud architecture, identifying and then rectifying the security issues should be at top priority. ...
doi:10.26483/ijarcs.v9i2.5861
fatcat:736y4gnlwzfzda6witzhcb3xum
Twin Clouds: Secure Cloud Computing with Low Latency
[chapter]
2011
Lecture Notes in Computer Science
In our approach, the user communicates with a resource-constrained Trusted Cloud (either a private cloud or built from multiple secure hardware modules) which encrypts algorithms and data to be stored ...
We split our protocols such that the Trusted Cloud performs security-critical precomputations in the setup phase, while the Commodity Cloud computes the time-critical query in parallel under encryption ...
We thank Radu Sion for pointing out the analogy of our Twin Clouds model with a rechargeable battery that accumulates energy (computations) over some time and can then be uncharged rapidly. ...
doi:10.1007/978-3-642-24712-5_3
fatcat:hlhej2sgk5gajd3l2m4mfwlnby
The Roles of Security and Trust: Comparing Cloud Computing and Banking
2013
Procedia - Social and Behavioral Sciences
We compare cloud computing and banking since to both security and trust is of vital importance for their service users and providers. ...
For any new technology such as cloud computing trust is not easily established, it gradually builds based on providers' reputation for good performance and security, earning users' trust over time. ...
Comparatively, we currently trust cloud less because it is yet to provide users with sufficient security and assurance. ...
doi:10.1016/j.sbspro.2013.02.015
fatcat:zos5qcwzlvfwfe5wwuntbvkz34
Privacy and Security in Mobile Cloud Computing: Review
2013
International Journal of Computer Applications
This review paper throws light on privacy and security issues of Mobile Cloud Computing. ...
Being in nascent stage, Mobile Cloud Computing has privacy and security issues which deter the users from adopting this technology. ...
Security to critical data is provided by isolating public cloud and trusted cloud. ...
doi:10.5120/13906-1833
fatcat:brsqocxkgzb6rm5z4ynj54mmcm
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
2014
International Journal of Computer Network and Information Security
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort ...
In this paper Cloud Computing security challenges will be discussed and proposed many new recommendations to increase security and trust also maintaining privacy. ...
) that can be rapidly provisioned and released with minimal management effort or service provider interaction [1] . ...
doi:10.5815/ijcnis.2014.08.05
fatcat:2k55llrywfh4flvf4yrupumvtq
When Sensor-Cloud Meets Mobile Edge Computing
2019
Sensors
After that we discuss the issues of sensor-clouds and propose some applications, especially a trust evaluation mechanism and trustworthy data collection which use mobile edge computing to solve the problems ...
Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing. ...
At present, some researches focusing on QoS aim to minimize the cost and maximize the profit of cloud service providers and edge service providers. ...
doi:10.3390/s19235324
pmid:31816927
fatcat:vq5hrxgixjetxggpjwiwabgw7u
Towards a cloud consumers credibility assessment and trust management of cloud services
2018
EAI Endorsed Transactions on Cloud Systems
In this Paper we proposed the method is a Trust Management Service (TMS). ...
Cloud service consumer can interact with the cloud providers. The malicious users can easily hack the user's private information. The cloud provider cannot able to find this problem. ...
They proposed the data security for cloud environment with trusted parties. ...
doi:10.4108/eai.16-5-2018.154775
fatcat:y65te6igcrbhpfxbgo2s7t3dgy
Workflow specification and scheduling with security constraints in hybrid clouds
2013
2nd IEEE Latin American Conference on Cloud Computing and Communications
Hybrid cloud management must deal with resources from both public and private clouds, as well as their interaction. ...
When workflows are executed in a hybrid cloud, dependencies among their components bring new factors to be considered during specification, scheduling, and virtual machine provisioning. ...
Thus, we conclude that it is possible to increase security with minimal addition of rejected requests. V. ...
doi:10.1109/latincloud.2013.6842219
dblp:conf/latincloud/MarconBDNMFKBGF13
fatcat:as2qw2y4lna43mgcldnvcb4hhm
Cloud Computing Technology: Security and Trust Challenges
2013
International Journal of Security Privacy and Trust Management
Looking at the literature of this technology, it can be claimed that the main concerns of the users of cloud are security issues especially trust. ...
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable technology. ...
To improve the security of information in cloud environment in [10] , a dynamic security framework has been provided with different methods. ...
doi:10.5121/ijsptm.2013.2501
fatcat:2e4sjvusbbhrtezb4axagimmhq
« Previous
Showing results 1 — 15 out of 43,138 results