Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2010 39th International Conference on Parallel Processing Workshops 2010
DOI: 10.1109/icppw.2010.45
|View full text |Cite
|
Sign up to set email alerts
|

The Characteristics of Cloud Computing

Abstract: Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud computing, we propose the characteristics of this area which make cloud computing being cloud computing and distinguish it from other research areas. The cloud computing has its own conceptional, technical, economic and user experience characteris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
125
0
7

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 284 publications
(148 citation statements)
references
References 4 publications
0
125
0
7
Order By: Relevance
“…A number of recent surveys focus on the identification of privacy concerns related to different cloud service models in terms of potential attacks that exploit the vulnerabilities of cloud technologies [1,14,17,19,26,47]. This paper extends the above by relating cloud threats and vulnerabilities to specific cloud quality properties that raise privacy concerns.…”
Section: Resultsmentioning
confidence: 93%
See 1 more Smart Citation
“…A number of recent surveys focus on the identification of privacy concerns related to different cloud service models in terms of potential attacks that exploit the vulnerabilities of cloud technologies [1,14,17,19,26,47]. This paper extends the above by relating cloud threats and vulnerabilities to specific cloud quality properties that raise privacy concerns.…”
Section: Resultsmentioning
confidence: 93%
“…For example, [13] demonstrates that attackers can exploit data duplication techniques to access customer data by obtaining hash code of the stored file. Side-channel attack can instantiate new VMs of a target virtual machine so that the new VM can potentially monitor the cache hosted on the same physical machine as described in [14]. Other works focus on security and privacy attacks that may lead to a misuse of information or resources.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, Pearson identify that privacy threats differ depending on the type of cloud scenario and lack of user control, potential unauthorized secondary usage, data proliferation are more dominate in public cloud [6]. Sidechannel attack can instantiate new VMs of a target virtual machine so that the new VM can potentially monitor the cache hosted on the same physical machine [7]. There are four possible places where faults can occur in cloud computing: provider-inner, provider-across, provider user and user-across [54].…”
Section: Related Workmentioning
confidence: 99%
“…Firstly to protect both the user that accesses a resource or service within the cloud as well as the user's data stored in the cloud. 7 International services residual.…”
Section: K) Identificationmentioning
confidence: 99%
“…Along with these characteristics, in [1] are identified others like strong fault tolerance, loosely coupling, virtualization, ease of use and the link with the business model which lead to the development of new business models [2], [3].…”
Section: Introductionmentioning
confidence: 99%