2015
DOI: 10.1145/2767005
|View full text |Cite
|
Sign up to set email alerts
|

From Security to Assurance in the Cloud

Abstract: The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and higher performance and flexibility, than traditional on-premises resources, without having to care about infrastructure management. Still, cloud tenants remain concer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
103
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 141 publications
(111 citation statements)
references
References 236 publications
0
103
0
2
Order By: Relevance
“…Past works have reported a number of reliability issues of cloud platforms caused by VM workload [7], as well as the importance of VM fault tolerance to safeguard the reliability and available capability of cloud platforms (e.g., EC2 [8], Google App Engine [9], VMware [10], Xen [11], KVM [12], etc.). Meanwhile, most existing research has focused on the reactive and preventive fault tolerance methods [13].…”
Section: State Of the Artmentioning
confidence: 99%
“…Past works have reported a number of reliability issues of cloud platforms caused by VM workload [7], as well as the importance of VM fault tolerance to safeguard the reliability and available capability of cloud platforms (e.g., EC2 [8], Google App Engine [9], VMware [10], Xen [11], KVM [12], etc.). Meanwhile, most existing research has focused on the reactive and preventive fault tolerance methods [13].…”
Section: State Of the Artmentioning
confidence: 99%
“…Here, it uses centered encoded and an additional scrambled operation close by get the opportunity to control part. The unified encoded technique is to meet the essential of both (encryption and deduplications) strategy [9]. In that, the key is resolved and encoded in light of the data gave.…”
Section: Manindra and Pradeepmentioning
confidence: 99%
“…Furthermore, the security techniques used in cloud can be classified into six based on the implemented security mechanism: encryption, signature, Intrusion Detection System (IDS)/Intrusion Preventions System (IPS), access control, authentication and trusted computing [65]. Thus, the access control is one of the basic security techniques in any computing system.…”
Section: Iaas Access Controlmentioning
confidence: 99%