2013
DOI: 10.1109/mic.2012.69
|View full text |Cite
|
Sign up to set email alerts
|

Key Challenges in Cloud Computing: Enabling the Future Internet of Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0
3

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 185 publications
(85 citation statements)
references
References 10 publications
0
82
0
3
Order By: Relevance
“…The third reason is more pragmaticsince there was relatively little interest and support from the industry, which would drive and advance the security research in grids, research efforts focussed on more relevant issues. In this light, cloud computing can be seen as a representative example; it is a highly commercialised and industry-driven research area, where security and privacy have been admitted by the major market influencers to be the key preventing factor since the very emergence of clouds [23].…”
Section: Monitoring Systems Comparisonmentioning
confidence: 99%
“…The third reason is more pragmaticsince there was relatively little interest and support from the industry, which would drive and advance the security research in grids, research efforts focussed on more relevant issues. In this light, cloud computing can be seen as a representative example; it is a highly commercialised and industry-driven research area, where security and privacy have been admitted by the major market influencers to be the key preventing factor since the very emergence of clouds [23].…”
Section: Monitoring Systems Comparisonmentioning
confidence: 99%
“…9 and a combination of person-to-person (P2P), machine-toperson (M2P) and machine-to-machine (M2M) communication as per Fig. 11 [24][25][26][27][28][29].…”
Section: Impact Of the Internet Of Thingsmentioning
confidence: 99%
“…They emphasise that they cannot adopt cloud computing if the cloud service is not compliant with GCS6. Cloud vendors will have to provide some assurance in the SLA (Kandukuri et al, 2009;Moreno-Vozmediano et al, 2013). "If you start to house some of that data in the cloud you may have some problems with complying with that …" As regards individual privacy, Council C argues information assurance and data security "are all part of any procurement we would do, they would be key requirements for whether it was cloud, traditional hosting or in-house.…”
Section: Information Assurance and Governancementioning
confidence: 99%