2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference On 2013
DOI: 10.1109/uic-atc.2013.13
|View full text |Cite
|
Sign up to set email alerts
|

It's All in the Cloud: Reviewing Cloud Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 23 publications
0
8
0
1
Order By: Relevance
“…This way, customers access the services they are paying for, or renting, over the Internet from public cloud, which run on remote servers that the provider will manage. Opposed to the private cloud, a public cloud will share its services among several different customers, but in a way that each individual customer’s data and applications are kept private and not accessible from other customers sharing the services [ 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…This way, customers access the services they are paying for, or renting, over the Internet from public cloud, which run on remote servers that the provider will manage. Opposed to the private cloud, a public cloud will share its services among several different customers, but in a way that each individual customer’s data and applications are kept private and not accessible from other customers sharing the services [ 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…The development of Cloud Computing is at the forefront of centralising application development and management, with a considerable impact on their configuration(s). It enables developers to use computer resources as a service, and therefore facilitates scaling application and access to data from anywhere, while saving costs and keeping hardware maintenance at low levels [1]. To keep up with the rapid development of the underlying technology, more and more companies are shifting their Information Technology (IT) infrastructures to the cloud, while providers offer more services in return.…”
Section: Introductionmentioning
confidence: 99%
“…The more individuals and organizations use third-party services/providers either for generic tasks i.e. web-based email, Cloud storage (Virvilis et al 2011a), (Virvilis et al 2011b), (Agudo et al 2011) or security related tasks (Marianthi Theoharidou et al 2013), (Pitropakis et al 2013), the higher will be the gain for the attackers if they manage to exploit those services.…”
Section: Indirect Attacksmentioning
confidence: 99%