2012 45th Hawaii International Conference on System Sciences 2012
DOI: 10.1109/hicss.2012.153
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Security: From Single to Multi-clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
89
0
1

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 206 publications
(90 citation statements)
references
References 32 publications
0
89
0
1
Order By: Relevance
“…Hendricks et al express that this outcome can sidestep data pollution made by a couple parts in the cloud. On the other hand, Cachinet al declare that using the Byzantine blemish tolerant replication tradition inside the cloud is inadmissible in light of the way that the servers having a spot with cloud suppliers use the same structure foundations and are physically set in the same spot [1]. According to Garfinkel, another security danger that may happen with a cloud supplier, for instance, the Amazon cloud organization, is a hacked mystery key or data intrusion.…”
Section: Literature Survey a Cloud Computing Security: From Singmentioning
confidence: 99%
See 3 more Smart Citations
“…Hendricks et al express that this outcome can sidestep data pollution made by a couple parts in the cloud. On the other hand, Cachinet al declare that using the Byzantine blemish tolerant replication tradition inside the cloud is inadmissible in light of the way that the servers having a spot with cloud suppliers use the same structure foundations and are physically set in the same spot [1]. According to Garfinkel, another security danger that may happen with a cloud supplier, for instance, the Amazon cloud organization, is a hacked mystery key or data intrusion.…”
Section: Literature Survey a Cloud Computing Security: From Singmentioning
confidence: 99%
“…If some person becomes acquainted with an Amazon account mystery key, they will have the ability to get to most of the account's events and resources. In spite of the way that cloud suppliers are aware of the noxious insider risk, they expect that they have essential responses for alleviate the issue [1]. Rocha and Correia [1] center possible aggressors for Iaas cloud suppliers.…”
Section: Literature Survey a Cloud Computing Security: From Singmentioning
confidence: 99%
See 2 more Smart Citations
“…Ensuring the security of stored data is the most challenging issue in the cloud environments. This security has been divided to several parts and one of the most important parts is maintaining security in the servers of cloud computing service providers [2]. Therefore, applying a cryptographic method for authorized user is the most popular existing solutions for solving security issues and increasing the reliability of the cloud environments.…”
Section: Introductionmentioning
confidence: 99%