2017
DOI: 10.5296/npa.v8i4.10240
|View full text |Cite
|
Sign up to set email alerts
|

Security Mapping of a Usage Based Cloud System

Abstract: The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users' p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 4 publications
0
0
0
Order By: Relevance
“…These comparisons are realized using a set of standard benchmark tools, whose results display the objective assessment of a particular cloud. To evaluate the security and the privacy, Kamatchi et al 13 proposed a categorization of the security and privacy threats based on the usage of the CS. In addition, they presented an algorithm to find the appropriate solution as per the usage category.…”
Section: Related Workmentioning
confidence: 99%
“…These comparisons are realized using a set of standard benchmark tools, whose results display the objective assessment of a particular cloud. To evaluate the security and the privacy, Kamatchi et al 13 proposed a categorization of the security and privacy threats based on the usage of the CS. In addition, they presented an algorithm to find the appropriate solution as per the usage category.…”
Section: Related Workmentioning
confidence: 99%