2011 IEEE 3rd International Conference on Communication Software and Networks 2011
DOI: 10.1109/iccsn.2011.6014715
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing security threats and responses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
93
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 207 publications
(97 citation statements)
references
References 2 publications
0
93
0
1
Order By: Relevance
“…Despite the benefits cloud storage may bring to users through convenience and lower cost, it also may bring security concerns. These worries have been identified by various researchers (CSA 2010(CSA , 2013aGTISC and GTRI 2013;Sabahi 2011;Shaikh and Haider 2011) who conclude that security concerns are increasing significantly every year.…”
Section: Measuring Security In Cloud Storagementioning
confidence: 99%
“…Despite the benefits cloud storage may bring to users through convenience and lower cost, it also may bring security concerns. These worries have been identified by various researchers (CSA 2010(CSA , 2013aGTISC and GTRI 2013;Sabahi 2011;Shaikh and Haider 2011) who conclude that security concerns are increasing significantly every year.…”
Section: Measuring Security In Cloud Storagementioning
confidence: 99%
“…In particular, services must be constantly available to the users and if interrupted, a solid recovery system should be ready for recovery and business continuity. Availability is important and could result in a business close down, if cloud services continuity is break down [4,29]. There are many reasons for the continuity breakdown such as DDoS attacks, hardware failure, and physical disaster.…”
Section: G) Traditional Security Business Continuity and Disaster Rementioning
confidence: 99%
“…Hypervisor is important in order to maintain the security, integrity and privacy of users and overall system context [29,31]. A VM's actions must be restricted to the level that has been granted from the contract agreement.…”
Section: M) Virtualizationmentioning
confidence: 99%
See 2 more Smart Citations