2013 International Conference on Cloud Computing and Big Data 2013
DOI: 10.1109/cloudcom-asia.2013.93
|View full text |Cite
|
Sign up to set email alerts
|

Security of Cloud Federation

Abstract: Federated Cloud is a recent topic in which multiple Cloud Service Providers (CSP) interact and share resources in order to serve their clients and overcome the problem of limited resources. In a Federated environment, CSP have an unlimited amount of resources due to the fact that each CSP can use the resources of other CSPs to serve its own clients when its own resources cannot do it. In a same concept, CSPs will be able to sell their unused capacity for other CSPs. From this definition, CSPs could buy resourc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…This can create security vulnerabilities and increase the risk of cyber‐attacks. The security of both physical and information assets on the cloud is crucial, therefore security measures must be applied such as access controls, encryption, and data integrity, as well as ensuring data availability and confidentiality 26 . When organizations begin to use resources from federated networks, ensuring the authentication of users and other actors in a secure and manageable way becomes a critical need.…”
Section: Challengesmentioning
confidence: 99%
“…This can create security vulnerabilities and increase the risk of cyber‐attacks. The security of both physical and information assets on the cloud is crucial, therefore security measures must be applied such as access controls, encryption, and data integrity, as well as ensuring data availability and confidentiality 26 . When organizations begin to use resources from federated networks, ensuring the authentication of users and other actors in a secure and manageable way becomes a critical need.…”
Section: Challengesmentioning
confidence: 99%