2011
DOI: 10.1016/j.proeng.2011.11.2551
|View full text |Cite
|
Sign up to set email alerts
|

Study on the Security Models and Strategies of Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
53
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 98 publications
(61 citation statements)
references
References 1 publication
1
53
0
1
Order By: Relevance
“…On the other hand, is not a study about the direction of future research are presented in the literature. Similarly, the research mentioned in computing security issues [33] cloud detailed summary of the discussions about the present and the latest solutions. Che et al (2011) studied the security model of cloud computing adoption, such as the cube model, a rental model, and a risk assessment model [34].…”
Section: Importance Of Security In Cloud Computingmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, is not a study about the direction of future research are presented in the literature. Similarly, the research mentioned in computing security issues [33] cloud detailed summary of the discussions about the present and the latest solutions. Che et al (2011) studied the security model of cloud computing adoption, such as the cube model, a rental model, and a risk assessment model [34].…”
Section: Importance Of Security In Cloud Computingmentioning
confidence: 99%
“…Modified services are the cloud computing service delivery basis [33]. These services are supported by the resource and upper layer services which require some security determination to guarantee that only the proper person will be able to use safely by having availability to this environment [33][34].…”
Section: Security Access Control Service (Sacs)mentioning
confidence: 99%
See 1 more Smart Citation
“…Users only pay for the actual usage of the services (pay-per-use). This enables companies to turn capital expenses to operational expenses, because upfront investments in IT infrastructure or software can be reduced [9,10]. Cloud based services are more easily scalable compared to stand-alone software because the resources in the cloud are usually shared by several tenants [9,11,12].…”
Section: Cloud Computingmentioning
confidence: 99%
“…Ref. [15] conducted a survey of the popular security models of cloud computing. In addition the work discussed the risks of cloud computing from the perspective of different stack holders, but security issues from ISSN: 2320-5407 Int.…”
Section: …………………………………………………………………………………………………… Introduction:-mentioning
confidence: 99%