2016
DOI: 10.3745/jips.03.0053
|View full text |Cite
|
Sign up to set email alerts
|

A Security Protection Framework for Cloud Computing

Abstract: Cloud computing is a new style of computing in which dynamically scalable and reconfigurable resources are provided as a service over the internet. The MapReduce framework is currently the most dominant programming model in cloud computing. It is necessary to protect the integrity of MapReduce data processing services. Malicious workers, who can be divided into collusive workers and non-collusive workers, try to generate bad results in order to attack the cloud computing. So, figuring out how to efficiently de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In addition, because the users can utilize all of the services in their smart home by remote devices out of the home, it should be careful not to be infected by malicious code, with respect to malicious users capturing or hacking the remote devices. Furthermore, malicious users should not be able to easily access the smart home system even if the remote devices are stolen, too [19].…”
Section: Security Threatsmentioning
confidence: 99%
“…In addition, because the users can utilize all of the services in their smart home by remote devices out of the home, it should be careful not to be infected by malicious code, with respect to malicious users capturing or hacking the remote devices. Furthermore, malicious users should not be able to easily access the smart home system even if the remote devices are stolen, too [19].…”
Section: Security Threatsmentioning
confidence: 99%
“…Thus, organizations and individuals of all sizes can utilize cloud technologies to enhance their needs. A multi-factor authentication scheme with an efficient access key distribution mechanism is proposed, which not only provides strong remote Literature [17] experimented with a new type of computing using cloud computing network technology that provides dynamically scalable and reconfigurable resources over the Internet. Malicious workers can be classified into colluding and non-colluding workers, who try to produce undesirable results and thus attack cloud computing.…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing [28,29] provides shared computer processing resources and data to computers and other devices on demand. In this study, we employed the cloud model to create a three-dimensional (3D) reconstruction framework for multiple remote robots.…”
Section: Introductionmentioning
confidence: 99%