Achieving Accountability and Secure Logging to Increase Trust in Cloud Environment
نویسندگان
چکیده
منابع مشابه
Towards Achieving Accountability, Auditability and Trust in Cloud Computing
The lack of confidence in entrusting sensitive information to cloud computing service providers (CSPs) is one of the primary obstacles to widespread adoption of cloud computing, as reported by a number of surveys. From the CSPs’ perspective, their long-term return-on-investment in cloud infrastructure hinges on overcoming this obstacle. Encryption and privacy protection techniques only solve pa...
متن کاملTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security s...
متن کاملAchieving Secure cloud Data Sharing
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control of their own data (particularly, financ...
متن کاملAccountability in Cloud Computing by Means of Chain of Trust
Cloud computing offers various services in form of infrastructure, platform, and software to meet the consumer requirements. It is radically changing how information technology services are created, delivered, accessed, and managed. However, this swift has prompted concerns regarding security and privacy due to cloud computing characteristics such as the multi-tenancy, elasticity, and layered a...
متن کاملImprovising Forward Stream Integrity for Secure Logging in the Cloud
The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or some) log entries is very important to any application using secure logging techniques. During this paper, we start by examining progressive in secure logging and determine some issues inherent to systems supported trust...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/12837-0166