2014 Third IEEE International Colloquium in Information Science and Technology (CIST) 2014
DOI: 10.1109/cist.2014.7016594
|View full text |Cite
|
Sign up to set email alerts
|

Security in cloud computing approaches and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The consumers can manage the deployed applications and can enhance also when needed. Example of PAAS includes Google App Engine, Windows azure, Force.com [3,9,10].…”
Section: Cloud Computing Service Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…The consumers can manage the deployed applications and can enhance also when needed. Example of PAAS includes Google App Engine, Windows azure, Force.com [3,9,10].…”
Section: Cloud Computing Service Modelsmentioning
confidence: 99%
“…Cloud computing has number of definitions but the U.S NIST (National Institute of Standards and Technology) has defined the cloud computing as "cloud computing is a model for enabling on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned by and released with minimal effort or service provider interaction." Although this resulted in attraction of the enterprises, educational organizations, government agencies etc., towards the cloud computing like Amazon, IBM, Google etc., creating their own cloud platforms to provide more services and grow their business [9,10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Studies have shown that smart IoT devices offer minimal to no protection from cyberattacks that may compromise the device or the data that it stores or transfers into the cloud. 4 Security-related standards and regulations are not well established yet, resulting in numerous legacy communication protocols which may not provide ample protection to data privacy. Moreover, the overhead of such legacy protection for data storage and transmission is not well understood.…”
Section: Introduction To Smart Homes and The Internet-of-thingsmentioning
confidence: 99%