2014
DOI: 10.14257/ijmue.2014.9.9.09
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Mechanisms for Data Protection: A Survey

Abstract: Cloud computing has evolved over the years in providing various services to the end users. The cloud features makes it acceptable by the industries in leveraging most of its applications in to the cloud. Security concerns exist in most cloud platforms and are prone to various attacks. This paper focuses on various security mechanisms that are provided in the enterprises and also discusses few of the common security mechanisms like authentication, authorization, encryption and access control. The methods deploy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Access control, consisting of authentication, authorization, and accounting, is a way of ensuring that the access is provided only to the authorized users, hence the data is stored in a secure manner [45].…”
Section: B Access Controlmentioning
confidence: 99%
“…Access control, consisting of authentication, authorization, and accounting, is a way of ensuring that the access is provided only to the authorized users, hence the data is stored in a secure manner [45].…”
Section: B Access Controlmentioning
confidence: 99%
“…In the case of SaaS, the applications are usually easily reached through a thin client interface, such as a web browser. [34] stated that cloud computing types include private, public, hybrid, and community. The private cloud is devoted to a single organization in providing the different services necessary for its working.…”
Section: Research Modelmentioning
confidence: 99%
“…7 depicting different processing time components. t idf = t GenerateRequest + t SendRequest + t ProcessRequest + t GenerateAssertion + t SendAssertion + t ProcessAsertion (1) Scalability can be increased by decreasing messages size and number of messages used in communication. By decreasing message size t GenerateRequest, t ProcessRequest, t GenerateAssertion and tProcessAsertion can be decreased.…”
Section: Scalabilitymentioning
confidence: 99%