2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet) 2012
DOI: 10.1109/cecnet.2012.6202020
|View full text |Cite
|
Sign up to set email alerts
|

Research on cloud computing security problem and strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 142 publications
(43 citation statements)
references
References 1 publication
0
42
0
1
Order By: Relevance
“…Wentao Liu et al [22] They have proposed that the security issue of distributed computing is vital and it can keep the fast improvement of distributed computing.…”
Section: Literature Surveymentioning
confidence: 99%
“…Wentao Liu et al [22] They have proposed that the security issue of distributed computing is vital and it can keep the fast improvement of distributed computing.…”
Section: Literature Surveymentioning
confidence: 99%
“…In 2012, Wentao Liu et al [22] recommend that the security issue of appropriated registering is essential and it can keep the quick change of circulated figuring. It exhibits some appropriated processing structures and separates conveyed figuring security issue and its strategy as demonstrated by the disseminated registering thoughts and characters.…”
Section: Literature Surveymentioning
confidence: 99%
“…Cloud computing has only recently become one of the most discussed IT paradigms thanks to the massive improvements in communication infrastructure. Cloud computing is the umbrella term given to the intersection of grid computing, distributed computing, virtualisation technologies, utility computing and other related technologies (Liu, 2012). The various functions are offered to clients as services in the cloud.…”
Section: Cloud Computingmentioning
confidence: 99%
“…These challenges include security (Feng and Li, 2014), the costing model (i.e., the cost for communications), the charging model (this is from the service provider's perspective and pertains to how the service provider charges for access to the elastic resource pool) and the service level agreement (quality, availability, reliability, and performance of the resources) (Dillo et al, 2010). Cloud systems are also susceptible to the traditional security problems of stand-alone systems such as security vulnerabilities, virus and hack attack (Liu, 2012). The core IT services of several companies are being moved to the cloud.…”
Section: Cloud Securitymentioning
confidence: 99%