2019 International Conference on Computational Science and Computational Intelligence (CSCI) 2019
DOI: 10.1109/csci49370.2019.00271
|View full text |Cite
|
Sign up to set email alerts
|

CloudMonitor: Data Flow Filtering as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Several researchers have proposed solutions to assure security data hosted in the cloud from cloud providers (i.e., internal threats), such as Dawoud et al (2016), Wang et al (2014), Ko et al (2011), Balamurugan and Saravanan (2019), and Ünal (2019). As well, a few have also addressed protecting multimedia content in VoD/multimedia systems when hosted in an untrusted cloud environment, such as Li and Yang (2016), Stewart and Long (2016), He et al (2017) and Alqahtani and Sheldon (2019). Thus, the problem we are attempting to solve with this research is protecting multimedia contents from cloud providers and outsiders in cloud-based VoD systems.…”
Section: Introductionmentioning
confidence: 99%
“…Several researchers have proposed solutions to assure security data hosted in the cloud from cloud providers (i.e., internal threats), such as Dawoud et al (2016), Wang et al (2014), Ko et al (2011), Balamurugan and Saravanan (2019), and Ünal (2019). As well, a few have also addressed protecting multimedia content in VoD/multimedia systems when hosted in an untrusted cloud environment, such as Li and Yang (2016), Stewart and Long (2016), He et al (2017) and Alqahtani and Sheldon (2019). Thus, the problem we are attempting to solve with this research is protecting multimedia contents from cloud providers and outsiders in cloud-based VoD systems.…”
Section: Introductionmentioning
confidence: 99%