2012 5th International Conference on BioMedical Engineering and Informatics 2012
DOI: 10.1109/bmei.2012.6513028
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…The proposed model uses a combination of authentication technique (digital signature) and key exchange algorithm (Diffie Hellman) blended with an encryption algorithm (AES) referred to as "Three-way mechanism" to be used to protect confidentiality of data stored in the cloud [16]. In [17], different security issues arising from the usage of cloud services are discussed. The author has proposed if one wants to take the cloud computing to the next level, the security capabilities need to be strengthened.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed model uses a combination of authentication technique (digital signature) and key exchange algorithm (Diffie Hellman) blended with an encryption algorithm (AES) referred to as "Three-way mechanism" to be used to protect confidentiality of data stored in the cloud [16]. In [17], different security issues arising from the usage of cloud services are discussed. The author has proposed if one wants to take the cloud computing to the next level, the security capabilities need to be strengthened.…”
Section: Related Workmentioning
confidence: 99%