2013
DOI: 10.5120/11632-7104
|View full text |Cite
|
Sign up to set email alerts
|

Data Location Verification in Cloud Computing

Abstract: Cloud computing has pioneered the area of On-demand services. The customer can choose the resources according to the current needs with the facility of incrementing and decrementing the resources in the future. It generally follows a pay-as-you-use model which has proven beneficial for enterprises and individual users alike. Since the services are hosted over the internet, one of the recent concerns that are rising among the users is about the location of their data. Sometimes it is necessary for the data to s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
(6 reference statements)
0
3
0
Order By: Relevance
“…e security services have not been explained. In Vaish et al's study [20], the technology that is trusted in the IOT computing environment is recommended. e technology is provided by TCG (trusted computing group), that is, the trusted computing platform (TCP) making the system, that is, data and applications, cryptographically secure.…”
Section: Literature Reviewmentioning
confidence: 99%
“…e security services have not been explained. In Vaish et al's study [20], the technology that is trusted in the IOT computing environment is recommended. e technology is provided by TCG (trusted computing group), that is, the trusted computing platform (TCP) making the system, that is, data and applications, cryptographically secure.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reference [28] suggested many factors that should be taken into consideration in providing a trusted platform in the cloud, including confidentiality, data confidentiality, software confidentiality, privacy or security, data integrity, availability and data location.…”
Section: Factors Affecting Trust In Cloud Storagementioning
confidence: 99%
“…Reference [23] claimed that availability and security are inter-linked as security is tightly connected to availability and its components, such as incident management, monitoring and data access. Reference [28] also stressed that authorized users must be able to access their data via all resources, software and hardware, once they have logged in successfully. Reference [29] stressed that availability is one of the most critical information security requirements in the cloud.…”
Section: Availabilitymentioning
confidence: 99%