Cloud computing security: from single to multi-clouds

MA AlZain, E Pardede, B Soh… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of …

Consistency in non-transactional distributed storage systems

P Viotti, M Vukolić - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Over the years, different meanings have been associated with the word consistency in the
distributed systems community. While in the'80s “consistency” typically meant strong …

[PDF][PDF] Data security, privacy, availability and integrity in cloud computing: issues and current solutions

S Aldossary, W Allen - International Journal of Advanced …, 2016 - pdfs.semanticscholar.org
Cloud computing changed the world around us. Now people are moving their data to the
cloud since data is getting bigger and needs to be accessible from many devices. Therefore …

Secure virtualization for cloud computing

F Lombardi, R Di Pietro - Journal of network and computer applications, 2011 - Elsevier
Cloud computing adoption and diffusion are threatened by unresolved security issues that
affect both the cloud provider and the cloud user. In this paper, we show how virtualization …

Rethinking vehicular communications: Merging VANET with cloud computing

R Hussain, J Son, H Eun, S Kim… - 4th IEEE International …, 2012 - ieeexplore.ieee.org
Despite the surge in Vehicular Ad Hoc NETwork (VANET) research, future high-end vehicles
are expected to under-utilize the on-board computation, communication, and storage …

A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability

Z Hao, S Zhong, N Yu - IEEE transactions on Knowledge and …, 2011 - ieeexplore.ieee.org
Remote data integrity checking is a crucial technology in cloud computing. Recently, many
works focus on providing data dynamics and/or public verifiability to this type of protocols …

Shredder: Learning noise distributions to protect inference privacy

F Mireshghallah, M Taram, P Ramrakhyani… - Proceedings of the …, 2020 - dl.acm.org
A wide variety of deep neural applications increasingly rely on the cloud to perform their
compute-heavy inference. This common practice requires sending private and privileged …

Byzantine-resilient secure software-defined networks with multiple controllers in cloud

H Li, P Li, S Guo, A Nayak - IEEE Transactions on Cloud …, 2014 - ieeexplore.ieee.org
Software-defined network (SDN) is the next generation of networking architecture that is
dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth …

A case for the accountable cloud

A Haeberlen - ACM SIGOPS Operating Systems Review, 2010 - dl.acm.org
For many companies, clouds are becoming an interesting alternative to a dedicated IT
infrastructure. However, cloud computing also carries certain risks for both the customer and …

Multi-factor authentication framework for cloud computing

RK Banyal, P Jain, VK Jain - 2013 fifth international conference …, 2013 - ieeexplore.ieee.org
Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the
most critical issues in a cloud computing environment. Authentication is a key technology for …