2015 International Conference on Cloud Computing (ICCC) 2015
DOI: 10.1109/cloudcomp.2015.7149664
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Instance Migration in the Cloud

Abstract: Hosting service providers are completely shifting towards cloud computing from dedicated hardware. However, corporates waffles to move their sensitive data to such a solution where data is no more in their control. The pay-asyou-go is primary notion of cloud service providers. However, they share infrastructure between different tenants that brings security issues. There is a need to provide trust and confidence to corporates that security mechanisms being used by the service providers are secure. Existing Iaa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The following section elaborates on the implementation details of the proposed solution. Initially, the testbed environment set up on the Amazon cloud is presented [79]. After network design and configuration, the SCs are developed for all the entities described in section III.…”
Section: B Testbed Setupmentioning
confidence: 99%
“…The following section elaborates on the implementation details of the proposed solution. Initially, the testbed environment set up on the Amazon cloud is presented [79]. After network design and configuration, the SCs are developed for all the entities described in section III.…”
Section: B Testbed Setupmentioning
confidence: 99%
“…Hierarchical clustering algorithm constructs a hierarchy among sensitive attributes values in order to split them into two or more clusters either on the basis of closeness or using a reversible process to merge clusters attributes values [23]. The outcome of the hierarchical can be represented by dendrogram [24,25,26]. For N sensitive attributes to be clustered, the basic process of NxN distance similarity matrix of hierarchical clustering is as below:…”
Section: B Clusteringmentioning
confidence: 99%