MechanisMs to Protect Data in the oPen clouD
ثبت نشده
چکیده
as organizations of all sizes and types consider the adoption of public and private cloud computing, they need to be confident that their security concerns can be addressed. Cloud computing environments inherently introduce a high degree of resource sharing among disparate workloads, and in the case of public clouds, that sharing includes unknown outside parties. Therefore, it is vital that the technologies that underlie cloud computing can ensure a known, trusted compute environment and enable data encryption while still meeting performance requirements and automation needs.
منابع مشابه
Fuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملIdentification and Prioritization of Factors Contributing in Cloud Service Selection Using Fuzzy Best-worst Method (FBWM)
The introduction of cloud computing techniques revolutionized the current of information processing and storing. Cloud computing as a competitive edge provides easy and automated access to the vast ocean of resources through standard network mechanisms to businesses and organizations. Due to the vast diversity of service providers and their respective variety of available services with differen...
متن کاملSecure and trustworthy file sharing over cloud storage using eid tokens
This paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. All peer to peer dialogs to exchange cryptographic material is implement...
متن کاملParametric Study of Fuel Vapor Concentration Distribution Due to Vaporization of Fuel Droplets in Free Atmosphere
The growth of a two-phase cloud of a liquid fuel in a stagnant atmosphere is studied using computational fluid dynamic techniques. In order to predict the danger and hazard of such cloud in open atmosphere it is very important to determine the fuel concentration in the cloud, especially in the far field region from the fuel reservoir. The results show that with omission of droplets break up...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013