Abstract
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.
- Christodorescu, M., Sailer, R., Schales, D., Sgandurra, D., and Zamboni, D. Cloud security is not (just) virtualization security, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, IL, Nov. 13, 2009. Google ScholarDigital Library
- Gentry, C. Fully homomorphic encryption using ideal lattices, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, May 31-June 2, 2009. Google ScholarDigital Library
- Kamara, S. and Lauter, K. Cryptographic cloud storage, Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, Tenerife, Canary Islands, Spain, January 25-28, 2010. Google ScholarDigital Library
- Ristanpart, T., Tromer, E., Sacham, H., and Savage, S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, Nov. 9-13, 2009. Google ScholarDigital Library
- Shi, E., Bethencourt, J., Chan, T-H., Song, D., and Perrig, A. Multi-dimensional range query over encrypted data, Computer Science Technical Report CMU-CS-06-135R, Carnegie Mellon University, March 2007.Google Scholar
Index Terms
- Security in the cloud
Recommendations
Cloud Computing Security: Amazon Web Service
ACCT '15: Proceedings of the 2015 Fifth International Conference on Advanced Computing & Communication TechnologiesCloud Computing is a recently emerged model which is becoming popular among almost all enterprises. It involves the concept of on demand services which means using the cloud resources on demand and we can scale the resources as per demand. Cloud ...
Cloud computing security: challenges and future trends
Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy clients' requirements for computing resources such as services, applications, networks, storage and servers. They offer the possibility of leasing these resources ...
Different facets of security in the cloud
CNS '12: Proceedings of the 15th Communications and Networking Simulation SymposiumCloud computing is a long fantasized visualization of computing as a utility, where data owners can remotely store and access their data in the cloud anytime and from anywhere. Using a shared pool of configurable resources, users can be relieved from ...
Comments