World Congress on Internet Security (WorldCIS-2013) 2013
DOI: 10.1109/worldcis.2013.6751034
|View full text |Cite
|
Sign up to set email alerts
|

Security threats and solutions in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Also, more security measures can be proposed to provide a comprehensive security to users regarding their data.The key-splitting and Homo-morphic encryption can be extended to have new breakthroughs in this area of research [38]. In [39], the emphasis was on secure data transfer between customers and cloud computing providers over the secured communication channels.…”
Section: A Security Threats and Risk Mitigation Strategies (Rq1)mentioning
confidence: 99%
“…Also, more security measures can be proposed to provide a comprehensive security to users regarding their data.The key-splitting and Homo-morphic encryption can be extended to have new breakthroughs in this area of research [38]. In [39], the emphasis was on secure data transfer between customers and cloud computing providers over the secured communication channels.…”
Section: A Security Threats and Risk Mitigation Strategies (Rq1)mentioning
confidence: 99%
“…In addition, costs are paid based on the duration of using them. On the whole, it is possible to say resource management is done in this level; such as Amazon EC2 [8].  PaaS: This is the middle layer of needed software and supporting them.…”
Section: A Cloud Resource Layersmentioning
confidence: 99%
“…The client need not worry about infrastructure, wherever he goes, all he needs is an internet connection to access the cloud services. • Cost: As all the resources (physical or virtual), infrastructure are provided by the cloud services provide only, so definitely the cost involved is very less [12]. According to pay per usage plan, the cost is minimized to a greater level.…”
Section: B Security Concerns and Detailed Characteristicsmentioning
confidence: 99%