2014
DOI: 10.1007/978-3-662-43616-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Data and Application Security in Cloud

Abstract: Cloud computing is an emerging technological paradigm, which provides computing resources as utility. Like other day-to-day utilities, cloud computing follows pay-as-you-use model, where users are charged according to the usage without regard to where the services are hosted or how they are delivered. Today, majority of companies follow an IT infrastructure-driven business model. With the growing demand, rise in customer base and market place competitions, companies prefer focusing on respective business polic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 29 publications
(26 reference statements)
0
1
0
Order By: Relevance
“…-The authentication ensures that the message is generated by the legitimate user. It protects the elements of communication (messages and entities) [4,5]. -In our context (Vehicular Cloud Network), the authentication is very important security requirement, because it is frequently solicited, to use cloud services [6].…”
Section: Security Requirementsmentioning
confidence: 99%
“…-The authentication ensures that the message is generated by the legitimate user. It protects the elements of communication (messages and entities) [4,5]. -In our context (Vehicular Cloud Network), the authentication is very important security requirement, because it is frequently solicited, to use cloud services [6].…”
Section: Security Requirementsmentioning
confidence: 99%