multiple-tenancy model, risk accumulation model, cube model of cloud computing, and summarized the main security risks of cloud computing. And we provide the solution to strengthen the security by virtualization. In this paper, we show how virtualization can increase the security of cloud computing...
Cloud computing is an emerging paradigm of computing that replaces computing as a personal commodity by computing as a public utility. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, convenience but it raises major issues, not least...
Cloud computing has emerged as a popular Computing model, with numerous advantages both to end users and providers in the form of providing convenience and reliable services to the end user. In few years, acceptance of cloud computing from Small ,Medium Enterprises (SME's) to major enterprises ...
information industry.On the hand,it brings about not only convenience and efficiency problems,but also great challenges in the field of information security and privacy protection.This paper is to introduce the basic concept,and analyze the challenges of security model and policy in cloud computing....
In view of the current popular cloud computing technology, some security problems were analyzed. According to information security classified protection security and integrity requirements, a formal description of hybrid security model is constructed based on BLP model and Biba model.The model not onlygu...
A study of Cyber Security model in cloud computing environment multiple-tenancy model, risk accumulation model, cube model of cloud computing, and summarized the main security risks of cloud computing deriving from different organizations. Finally, we gave some security strategies from the perspective ...
The security necessities in cloud computing environment is the discovery of the vulnerabilities in the landscape of clouds, detection of security solutions, and finding evidence that early adopters or developers have grown more concerned with security with the proposed model. With this model, some ...
A security model to protect the isolation of medical data in the cloud using hybrid cryptography A cloud computing platform delivers a cost-efficient path for cloud users to store and access data privately over remote storage via an Internet connection... S Gadde,J Amutharaj,S Usha - 《Journal...
What Are the Stages of Security in Cloud Computing? Best Practices for Implementing a Cloud Security Maturity Model Keep Your Cloud Secure with PrivX by SSH What Is a Cloud Security Maturity Model? The cloud security maturity model is a list of general criteria that helps organizations gauge thei...
Cloud computing is basically virtual pool of resources and it provides... SS Khan,PRR Tuteja - 《International Journal of Computer Science & Mobile Computing》 被引量: 22发表: 2014年 TO ENHANCE MULTIMEDIA SECURITY IN CLOUD COMPUTING ENVIRONMENT USING CROSSBREED ALGORITHM In model RSA algorithm and...