Cloud computing security: from single to multi-clouds
The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of …
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of …
Consistency in non-transactional distributed storage systems
Over the years, different meanings have been associated with the word consistency in the
distributed systems community. While in the'80s “consistency” typically meant strong …
distributed systems community. While in the'80s “consistency” typically meant strong …
[PDF][PDF] Data security, privacy, availability and integrity in cloud computing: issues and current solutions
Cloud computing changed the world around us. Now people are moving their data to the
cloud since data is getting bigger and needs to be accessible from many devices. Therefore …
cloud since data is getting bigger and needs to be accessible from many devices. Therefore …
Secure virtualization for cloud computing
Cloud computing adoption and diffusion are threatened by unresolved security issues that
affect both the cloud provider and the cloud user. In this paper, we show how virtualization …
affect both the cloud provider and the cloud user. In this paper, we show how virtualization …
Rethinking vehicular communications: Merging VANET with cloud computing
Despite the surge in Vehicular Ad Hoc NETwork (VANET) research, future high-end vehicles
are expected to under-utilize the on-board computation, communication, and storage …
are expected to under-utilize the on-board computation, communication, and storage …
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
Remote data integrity checking is a crucial technology in cloud computing. Recently, many
works focus on providing data dynamics and/or public verifiability to this type of protocols …
works focus on providing data dynamics and/or public verifiability to this type of protocols …
Shredder: Learning noise distributions to protect inference privacy
A wide variety of deep neural applications increasingly rely on the cloud to perform their
compute-heavy inference. This common practice requires sending private and privileged …
compute-heavy inference. This common practice requires sending private and privileged …
Byzantine-resilient secure software-defined networks with multiple controllers in cloud
Software-defined network (SDN) is the next generation of networking architecture that is
dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth …
dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth …
A case for the accountable cloud
A Haeberlen - ACM SIGOPS Operating Systems Review, 2010 - dl.acm.org
For many companies, clouds are becoming an interesting alternative to a dedicated IT
infrastructure. However, cloud computing also carries certain risks for both the customer and …
infrastructure. However, cloud computing also carries certain risks for both the customer and …
Multi-factor authentication framework for cloud computing
RK Banyal, P Jain, VK Jain - 2013 fifth international conference …, 2013 - ieeexplore.ieee.org
Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the
most critical issues in a cloud computing environment. Authentication is a key technology for …
most critical issues in a cloud computing environment. Authentication is a key technology for …