2015 Fifth International Conference on Advanced Computing &Amp; Communication Technologies 2015
DOI: 10.1109/acct.2015.80
|View full text |Cite
|
Sign up to set email alerts
|

Security Concerns and Countermeasures in Cloud Computing Paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…First, in order to improve the confidentiality, Data Encryption and the use of Sandboxes to isolate executions, data and communications, are commonly applied [25]. Secondly, for reducing the data loss, specific protocols are used to send information to fog nodes or to cloud environments, by means of Version Control and Configuration Management approaches [87,88]. Third, File Permissions, User Access Controls, Checksum and Hashing methods are applied to increase the data integrity, detecting and preventing unauthorized alteration of the information over its entire life cycle [89].…”
Section: Securitymentioning
confidence: 99%
“…First, in order to improve the confidentiality, Data Encryption and the use of Sandboxes to isolate executions, data and communications, are commonly applied [25]. Secondly, for reducing the data loss, specific protocols are used to send information to fog nodes or to cloud environments, by means of Version Control and Configuration Management approaches [87,88]. Third, File Permissions, User Access Controls, Checksum and Hashing methods are applied to increase the data integrity, detecting and preventing unauthorized alteration of the information over its entire life cycle [89].…”
Section: Securitymentioning
confidence: 99%
“…DIAO Zhe, WANG Qinghong, SU Naizheng, ZHANG Yuhan [9] , "Study on Data Security Policy Based On Cloud Storage", IESEE, 2017. This paper tells about the security issues and related data security policies and how to overcome that issues.…”
Section: Literature Reviewmentioning
confidence: 99%