2019
DOI: 10.1007/978-3-030-14350-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Computational Intelligence in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 50 publications
0
5
0
Order By: Relevance
“…Other lines of work close to ours are related to the adoption of blockchain and smart contracts for data management and access control (e.g., (Di Francesco Maesa et al, 2017;Kokoris-Kogias et al, 2020;Nguyen et al, 2019;Nguyen et al, 2021;Shafagh et al, 2017;Zichichi et al, 2020;Zyskind et al, 2015)), and privacy and security in cloud computing (e.g., (Donida Labati et al, 2020;Zhang et al, 2020)). These approaches are however complementary to ours, as they do not consider selective encryption and key derivation for enforcing access restrictions to traded resources, and do not consider the peculiarities of data markets.…”
Section: Related Workmentioning
confidence: 85%
“…Other lines of work close to ours are related to the adoption of blockchain and smart contracts for data management and access control (e.g., (Di Francesco Maesa et al, 2017;Kokoris-Kogias et al, 2020;Nguyen et al, 2019;Nguyen et al, 2021;Shafagh et al, 2017;Zichichi et al, 2020;Zyskind et al, 2015)), and privacy and security in cloud computing (e.g., (Donida Labati et al, 2020;Zhang et al, 2020)). These approaches are however complementary to ours, as they do not consider selective encryption and key derivation for enforcing access restrictions to traded resources, and do not consider the peculiarities of data markets.…”
Section: Related Workmentioning
confidence: 85%
“…Trust is reliant on the CSP's obligation to protect data from all dangers, VM security, and other legal factors. During the cloud system security review (CIA), "Con dentiality, Integrity, and Availability" are the three factors that are taken into account (R. D. Labati et al 2020). The cost of each attack in 2019 was 3,83,365 US Dollars, as per the Cyber Security Breaches Report.…”
Section: Cloud Computing-based Data De-duplication Security: a Conundrummentioning
confidence: 99%
“…Security is a major requirement of many researchers, anyone how interested in can find a lot of papers that focus on this field, for example see [25]- [31]. At the same time, security and privacy concerns are the main issues that prevent wide acceptance of cloud concepts [3], [32] where switching to a commercial public cloud reduces direct control of systems that manage reliable data and applications [7]. Figure 1 illustrates the differences between traditional security and cloud security.…”
Section: Security In Cloud Computingmentioning
confidence: 99%
“…Simultaneously, the user should apply measures to reinforce their application and use robust passwords/authentication methods [37]. In the environment of cloud computing, data security is a combination of three concepts, called the CIA triangle which consists of: confidentiality, integrity, and availability [3], [14], [38].…”
Section: Cloud Data Security and Privacy 51 Cloud Data Securitymentioning
confidence: 99%