2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) 2012
DOI: 10.1109/iccctam.2012.6488090
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing: Exploring security design approaches in Infrastructure as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The academic and professional worlds have always been concerned about cybersecurity. Network penetration and theft of high-value data are the principal aims of modern network intrusion [1,2]. The data center, the core of data storage and processing, is a primary target for cyber attackers, who can penetrate networks, plant Trojans, and lurk to obtain information.…”
Section: Introductionmentioning
confidence: 99%
“…The academic and professional worlds have always been concerned about cybersecurity. Network penetration and theft of high-value data are the principal aims of modern network intrusion [1,2]. The data center, the core of data storage and processing, is a primary target for cyber attackers, who can penetrate networks, plant Trojans, and lurk to obtain information.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, it also provides massive scalability, which is the ability to handle large load in capable manner, and elasticity, which is the ability to vary usage of computational resources based on load. Using Cloud Computing is also financially less burdensome for its users and helps them to reduce their dependency on IT support [8]. Needs to store most of the relevant data and access it efficiently is the main driving force behind many companies moving to the Cloud [10].…”
Section: Introductionmentioning
confidence: 99%