2019
DOI: 10.1016/j.cose.2018.12.014
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(29 citation statements)
references
References 30 publications
0
27
0
Order By: Relevance
“…The chapter presents various architectures based on the cloud IDS, which are embedded cloud environments to address various security issues. Fadi and Hemayed [9] provide a literature review of the proven clouds that are used in infrastructure as a service contracts. The authors argue that the integration of the new technology, which is trust computing, with cloud computing can be provided by the proposed architectural solutions of the infrastructure as a service and on the grounds on which user trust in cloud service providers arises.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The chapter presents various architectures based on the cloud IDS, which are embedded cloud environments to address various security issues. Fadi and Hemayed [9] provide a literature review of the proven clouds that are used in infrastructure as a service contracts. The authors argue that the integration of the new technology, which is trust computing, with cloud computing can be provided by the proposed architectural solutions of the infrastructure as a service and on the grounds on which user trust in cloud service providers arises.…”
Section: Literature Reviewmentioning
confidence: 99%
“…16). Recently, the combination of various methods provides an almost optimal solution for TR management in privacy protection of cloud computing services [120].…”
Section: Trust and Reputation Of Cloud Computingmentioning
confidence: 99%
“…It's a popular technology for privacy protection research. Recently, there have been many achievements of trust-based privacy protection in academia [119], [120].…”
Section: A Privacy Based On Trustmentioning
confidence: 99%
“…A key component in building such trusted computing systems is a highly secure anchor (either software-or hardware-based) that serves as a Root-of-Trust (RoT) towards providing cryptographic functions, measuring, and reporting the behavior of running software, and storing data securely. Prominent examples include Trusted Execution Environments (TEEs, e.g., TrustZone) [22] and Trusted Platform Modules (TPMs) [13].…”
Section: Introductionmentioning
confidence: 99%