2012 IEEE Eighth World Congress on Services 2012
DOI: 10.1109/services.2012.25
|View full text |Cite
|
Sign up to set email alerts
|

Secure Private Cloud Architecture for Mobile Infrastructure as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Table 2 presents the most common issues and possible suggestions of the cloud-based IoT network. Most commonly cloud users experience many security vulnerabilities and threats such as user identity management, data access control, system complexity, reliability, infrastructure, and physical security, misconfiguration of software, encryption, and device heterogeneity [77], [89], [90].…”
Section: A Integration Of Iot and Cloud Computingmentioning
confidence: 99%
“…Table 2 presents the most common issues and possible suggestions of the cloud-based IoT network. Most commonly cloud users experience many security vulnerabilities and threats such as user identity management, data access control, system complexity, reliability, infrastructure, and physical security, misconfiguration of software, encryption, and device heterogeneity [77], [89], [90].…”
Section: A Integration Of Iot and Cloud Computingmentioning
confidence: 99%
“…In mobile cloud computing, privacy and data protection, are the biggest challenge for the mobile user as their confidential data is stored and relocated from mobile devices to heterogeneous distributed cloud servers leveraging various cloud services [15]. These servers are situated in different places that are owned and maintained by the service providers only.…”
Section: Privacy Challenges and Protection Goalsmentioning
confidence: 99%
“…Again, if the service is provided via the internet, the data in transit is vulnerable to various kinds of network level attacks like eavesdropping and session hijacking. Hence, there is a need for a system that can provide cloud service to the organizations internally, which can be trusted for the confidentiality of data [12].…”
Section: Threats Against Mobile Cloud Storagementioning
confidence: 99%