2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) 2012
DOI: 10.1109/iccctam.2012.6488099
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing security: Concerns, strategies and best practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…According to NIST cloud model, consumer can have greater security control over more resources as one move from SaaS to PaaS and PaaS to laaS service model [18]. Virtual Machine(VM), VM images, VM boundaries, virtual network and hypervisor security for IaaS security; Service Oriented Architecture (SOA) and Application Programming Interface (API) security for PaaS security; Web application vulnerability and configuration for SaaS security must be procured [12].…”
Section: Service Modelsmentioning
confidence: 99%
“…According to NIST cloud model, consumer can have greater security control over more resources as one move from SaaS to PaaS and PaaS to laaS service model [18]. Virtual Machine(VM), VM images, VM boundaries, virtual network and hypervisor security for IaaS security; Service Oriented Architecture (SOA) and Application Programming Interface (API) security for PaaS security; Web application vulnerability and configuration for SaaS security must be procured [12].…”
Section: Service Modelsmentioning
confidence: 99%
“…The creation of the cloud security architecture should be directed by the security policy. Some of the security requirements for the cloud architecture are listed below: [15] a. Network Time Protocol by synchronizing at the same time helps in the correct working of systems and gives reliable system information records.…”
Section: Cloud Security Requirementsmentioning
confidence: 99%
“…To provide information security to the saved client entity record on the cloud server, we have designed the following procedural events .This tool proves to be cost-effective and light weight without any additional database requirements. The Algorithm below illustrates the events sequentially in a given cloud computing scenario [14] [15] [16] 1. Initialize Client Process as P1 and Server Process as P2 (for a given cloud computing scenario).…”
Section: Proposed Design For Improvised and Reliable Information Intementioning
confidence: 99%