2018
DOI: 10.3390/s18030753
|View full text |Cite
|
Sign up to set email alerts
|

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

Abstract: Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…In addition, this study proposes a shared process to classify a CSS according to trust levels based on its behavior, this task being performed autonomously by SCs. The proposed solution improves previous work [8], minimizing its limitations, and increasing its efficiency. The main differences between this work and the one done previously [8] are the following:…”
Section: A Main Contributions Of This Studymentioning
confidence: 70%
See 3 more Smart Citations
“…In addition, this study proposes a shared process to classify a CSS according to trust levels based on its behavior, this task being performed autonomously by SCs. The proposed solution improves previous work [8], minimizing its limitations, and increasing its efficiency. The main differences between this work and the one done previously [8] are the following:…”
Section: A Main Contributions Of This Studymentioning
confidence: 70%
“…The proposed solution improves previous work [8], minimizing its limitations, and increasing its efficiency. The main differences between this work and the one done previously [8] are the following:…”
Section: A Main Contributions Of This Studymentioning
confidence: 70%
See 2 more Smart Citations
“…Although the topic of CC in health care has been widely discussed in the literature, existing publications mainly focus on development of single CC applications or platforms in health care [ 12 - 16 ] and development of security mechanisms for the use of CC [ 17 - 21 ]. Although some studies have tried to conceptualize CC or interpret this phenomenon for health care settings [ 4 , 22 , 23 ], they are heavily based on a general understanding of traditional health IT artifacts or mainly rely on the interpretation of CC in a common context, which leads to an insufficient or unspecific conceptual understanding of CC for health care.…”
Section: Introductionmentioning
confidence: 99%