2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC) 2010
DOI: 10.1109/hpcc.2010.87
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Protection in a Cloud Computing Environment

Abstract: The term "cloud computing" has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(10 citation statements)
references
References 6 publications
0
9
0
1
Order By: Relevance
“…This particular architecture design helps users to modify security policies according to their need. However, outsourcing identity providers few concerns [93] including: (1) how to make sure that there will be no shift of data and processes to another location; (2) how to delete data after expiration of contract and (3) how to avoid both accidental and deliberate interference across the domain of clouds. In principle, there is no scheme to match the access control requirements with those that are provided by cloud providers.…”
Section: Federated Identity Management Systemmentioning
confidence: 99%
“…This particular architecture design helps users to modify security policies according to their need. However, outsourcing identity providers few concerns [93] including: (1) how to make sure that there will be no shift of data and processes to another location; (2) how to delete data after expiration of contract and (3) how to avoid both accidental and deliberate interference across the domain of clouds. In principle, there is no scheme to match the access control requirements with those that are provided by cloud providers.…”
Section: Federated Identity Management Systemmentioning
confidence: 99%
“…It is common for modern organisations to utilise and benefit from the adoption of cloud and internet based computing. Users of cloud computing infrastructure can concentrate on the delivery of high value/profit services at high levels of Quality of Service (QoS), without being pre-occupied with large-scale investments in hardware and specialist skills for the support and maintenance of such systems [1], [2]. In particular the regular upgrades and expense of licenses of application software used to run business processes, related transactions and decision-support systems [3] are a significant demand upon an organisation's resources.…”
Section: Introductionmentioning
confidence: 99%
“…As both individuals and organisations embrace the benefits of cloud computing infrastructure, more and more data storage and business process services are being transferred or established in clouds [1]. This shift from local to remote infrastructure drastically reduces the effort and expenditure [4] required for system maintenance [2], [3], enabling system users to concentrate on business concerns such as QoS and performance, etc.…”
Section: Introductionmentioning
confidence: 99%