2010 International Conference on High Performance Computing &Amp; Simulation 2010
DOI: 10.1109/hpcs.2010.5547137
|View full text |Cite
|
Sign up to set email alerts
|

Deployment models: Towards eliminating security concerns from cloud computing

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…There are some models at the deployment level which deal with the security risks but with limitations in confidentiality and integrity such as Separation Model -Migration Model -Availability Model -Tunnel Model -Cryptography Model [32].…”
Section: Discussionmentioning
confidence: 99%
“…There are some models at the deployment level which deal with the security risks but with limitations in confidentiality and integrity such as Separation Model -Migration Model -Availability Model -Tunnel Model -Cryptography Model [32].…”
Section: Discussionmentioning
confidence: 99%
“…The cloud service provider's computing resources are pooled together in an effort to serve multiple consumers without knowing their data location which is going to be stored in the Cloud. Computing and IT resources are encapsulated as services, hiding all the details of implementation, deployment, maintenance and administration [5]. A group of services, different demands may involve different set of services are given in a different order [2].…”
Section: Introductionmentioning
confidence: 99%
“…Security concerns have been raised due to the new computing model introduced by cloud computing, which is characterized by off-premises computing, lost control of IT infrastructure, service-oriented computing, and virtualization. Some of the concerns are fault tolerance, service availability, data migration, data confidentiality and integrity [5]. The deployment models of cloud computing based applications for addressing the security related concerns in cloud computing are explained.…”
Section: Introductionmentioning
confidence: 99%
“…Having the whole IT system and data on a single cloud may give the cloud operator excessive power for controlling and modifying users' data. Five deployment models are proposed to handle this security problem and other problems including fault tolerance, service availability, data migration, and data confidentiality and integrity [11].…”
Section: Figure 1 Security Requirement In Cloud Migrationmentioning
confidence: 99%