Skip to main content
The idea of Homomorphic encryption is to make sure data confidentiality in messages, storage or in utilize by processes with methods similar to conventional cryptography, but with additional abilities to compute over encrypted data,... more
    • by 
    •   4  
      Cloud ComputingCloud Computing SecuritySecurity in Cloud ComputingCloud Computing and Virtualization
Data protection concerns have been identified as one of the most serious barriers for the deployment and development of cloud computing. 1 There is a general lack of regulation and policy on a European (EU) level. The Data Protection... more
    • by 
    •   8  
      Information SecurityEuropean LawPrivacyInformation Security and Privacy
— The cloud is no longer in future, it’s here today. The cloud has fundamentally changed the landscape of computing. Governments are facing critical challenge of improving resource utilization, increase service responsiveness, distributed... more
    • by 
    •   6  
      Cloud ComputingHybrid CloudCloud Computing SecurityCloud Security
    • by 
    •   3  
      Cloud ComputingCloud Computing EconomyCloud Computing Security
This research aims to analyze the current security vulnerabilities in cloud computing, study and identify the current preventive measure used in cloud computing as well as to determine the possible areas for improvement in terms of... more
    • by 
    •   4  
      Network SecurityCloud ComputingCloud Computing SecurityEnsuring data storage security in cloud computing
Cloud computing is an emerging technology and it is internet based computing, where shared resources, software and information, are provided to clients. Using Storage-as-a-Service, users and organizations can store their data remotely... more
    • by  and +1
    • Cloud Computing Security
Salesforce is a very hot cloud computing technology in the IT industry, which is available on the cloud, with no need to install any software as well as no hardware required. Salesforce is one on-demand CRM, which runs on the platform, as... more
    • by 
    •   3  
      BusinessCloud ComputingCloud Computing Security
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
    • by 
    •   16  
      Information SecurityInformation Security AuditingInformation Security and PrivacyCloud Computing
In the light of the rapidly changing and benefits brought by cloud computing, the study is to find the critical factors that may hinder the benefits of cloud adoption, with respective measures proposed. It was found that control... more
    • by 
    •   2  
      Cloud ComputingCloud Computing Security
Medical devices are becoming a major point of attack in the healthcare industry. In today's healthcare environment, medical devices send their data directly to the cloud. Medical devices can send data directly to the Electronic Health... more
    • by 
    •   2  
      Cloud Computing SecurityMedical devices risk management
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
    • by 
    •   6  
      Computer SecurityCloud ComputingCloud Computing SecurityInternet of Things (IoT)
This paper aims to provide key insights into the privacy issues and internal threats that come to hamper SMEs by adopting cloud computing for their business functions. The results obtained through detailed study of reasons behind SMEs... more
    • by 
    •   5  
      Information Security and PrivacySMES IN DEVELOPING COUNTRIESCloud ComputingPrivacy and data protection
    • by 
    •   4  
      Cloud ComputingCyber SecurityCloud Computing SecurityEncryption Algorithms
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more
    • by 
    •   19  
      EducationBangladeshCloud ComputingCloud Computing Economy
In last two decades continues increase of comput-ational power and recent advance in the web technology cause to provide large amounts of data. That needs large scale data processing mechanism to handle this volume of data. MapReduce is a... more
    • by 
    •   20  
      Computer ScienceComputer EngineeringComputer NetworksClouds
Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009).... more
    • by 
    •   6  
      Computer ScienceComputer SecurityCloud ComputingCloud Computing Security
Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative... more
    • by 
    •   5  
      Computer ScienceRisk ManagementCloud ComputingCloud Computing Security
Cloud Computing is the new trend in Information Technology in recent years. It has attracted many clients, organizations and businesses due to its advantages of scalability, throughput, easy and cheap access and on demand. Cloud has the... more
    • by 
    • Cloud Computing Security
Cloud computing technology offers the possibility of inter-organizational medical data sharing at a larger scale. The different organizations can maintain their own cloud environment while exchanging healthcare data among them in a... more
    • by 
    •   6  
      Cloud ComputingMobile Cloud ComputingCloud Computing SecurityCloud Security
Inspired by the dramatic evolution of VANETclouds, this paper proposes a new VANET-cloud service called VWaaS (Vehicle Witnesses as a Service) in which vehicles moving on the road serve as anonymous witnesses of designated events such as... more
    • by 
    •   9  
      PrivacyInformation Security and PrivacyData ProtectionMobile Cloud Computing
Understanding cloud computing: legal risks and components.  Cloud legal and compliance issues.  Workshop covered data ownership, privacy, security, and compliance.
    • by 
    •   4  
      Ethics & Compliance ManagementCloud ComputingCloud Computing, Privacy, and Information Rights LawCloud Computing Security
Computing is changing frequently to serve the user’s needs for security and reducing a dependency which leads researcher to develop newer technologies. Cloud computing is one of those technologies which successfully delivers the service... more
    • by 
    •   8  
      Cloud ComputingCloud Computing SecurityActive ObjectsActive storage
Cloud computing is a growing area of concern in the IT security community because cloud architectures are literally popping up all over. Public clouds are available from Google.com, Amazon.com, Microsoft, Oracle/Sun, Canonical/Eucalyptus... more
    • by 
    •   4  
      Information Security and PrivacyCloud ComputingCloud Computing SecurityCloud Security
Cloud Computing is a newly born type of computation, which depends on the shared resources of the network. Cloud Computing term discovered from that time when the system can access the different types of applications as well as different... more
    • by 
    •   10  
      Information SystemsComputer ScienceInformation TechnologyInformation Security
IEEE Base paper- Identity based secure distributed data storage schemes.
    • by 
    •   4  
      Network SecurityUser InterfaceCloud Computing SecurityWeb Server Log Files Access
Cloud Computing is emerging amongst all the bombilate words of acclivitous technologies as the most prodigious maturations in the chronicles of computing. As it still takes time to settle,a new egressing challenge as felt whilst its... more
    • by 
    •   5  
      Cyber SecurityBig DataIT SecurityCloud Computing Security
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use... more
    • by 
    •   2  
      Cloud ComputingCloud Computing Security
The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and... more
    • by 
    •   7  
      Cloud ComputingInternet economicsCloudCloud Computing Security
In this paper, we investigate the problem of improving the performance and scalability of large firewall policies that comprise thousands of rules by detecting and resolving any potential conflicts among them. We present a novel, highly... more
    • by 
    •   3  
      Network SecurityComputer NetworksCloud Computing Security
    • by 
    •   2  
      Cloud ComputingCloud Computing Security
The purpose of this thesis is to valuate different approaches and methods used in the oil industry, based on theory, research and industrial experience. An evaluation of three oil companies’ safety culture approaches were therefore... more
    • by 
    •   12  
      ManagementMarketingComputer ScienceInformation Security
Information Technology (IT) infrastructure and related research communities can help tackle environmental challenges in developing countries through environmentally sustainable models of economic development. The paper sought to examine... more
    • by 
    •   12  
      MultimediaSoft ComputingSoft Computing TechniquesCloud Computing
The unmatchable progress in Information Technology based Products have encouraged the customers to use free unlimited and ever available cloud storages. The Cloud Storages save hardware investment of customers for storage. Rapid Data... more
    • by 
    •   3  
      Computer NetworksInformation Security and PrivacyCloud Computing Security
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
    • by 
    •   16  
      Information SecurityInformation Security AuditingInformation Security and PrivacyCloud Computing
Cloud computing has gained a lot of publicity in the current IT world. After the internet, Cloud computing is the next big thing in the computer world. Cloud computing is the use of the Internet for the tasks performed on the computer and... more
    • by 
    •   20  
      EngineeringElectronic EngineeringControl Systems EngineeringComputer Science
Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include... more
    • by 
    • Cloud Computing Security
ABSTACT Fog computing is a prime example that extends Cloud computing and Internet of Things (IoT) application services to the edge of the network. Correlated to Cloud, Fog computing provides data transferring, larger and more immediate... more
    • by 
    •   12  
      The Internet of ThingsCloud ComputingMobile Cloud ComputingCloud Computing Security
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud... more
    • by 
    •   11  
      Computer ScienceInformation SecurityComputer SecurityReview
Cloud computing is the latest distributed computing paradigm and it offers tremendous opportunities to solve large-scale scientific problems. However, it presents various challenges that need to be addressed in order to be efficiently... more
    • by 
    •   20  
      EngineeringElectrical EngineeringElectronic EngineeringComputer Science
Secure search over encrypted remote data is crucial in cloud computing to guarantee the data privacy and usability. To prevent unauthorized data usage, fine- grained access control is necessary in multi-user system. However, authorized... more
    • by 
    •   5  
      Access ControlPrivacy and data protectionCloud Computing SecurityKey generation
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient... more
    • by  and +1
    •   8  
      Computer ScienceInformation SecurityComputer SecurityCryptography
—Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud... more
    • by 
    •   4  
      Cloud ComputingCloud Computing SecuritySecurity in Cloud ComputingHijacking
Today, human being can " t think of surviving without internet as it becomes the inevitable part of their life where each and everything in this world is connected together with the help of internet. Connectivity is one of the fundamental... more
    • by 
    •   2  
      Cloud Computing SecuritySecurity in Cloud Computing
This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by... more
    • by 
    •   18  
      Computer ScienceDistributed ComputingGrid ComputingComputer Networks
—In previous publications we have introduced the concept of using a component-based software engineering paradigm to build Internet-enabled applications. We have proposed that this design allows for greater flexibility in deployment,... more
    • by 
    •   9  
      Component-Based Software Engineering (CBSE)Cloud ComputingCloud Computing SecuritySecurity in Cloud Computing
Cloud computing provides IT services to users worldwide, Data centers in Clouds consume large amount of Energy leading to highly effective costs. Therefore green energy computing is solution for decreasing operational costs. This survey... more
    • by 
    •   10  
      Computer ScienceInformation SecurityCloud ComputingMobile Cloud Computing
Cloud computing has captured a major attention of research community to provide efficient data management. SQL query processor based on cloud technology is an effort to introduce high-level needs like graphical interface which includes... more
    • by 
    •   5  
      Data ManagementCloud ComputingCloud Computing SecuritySQL Query
Citation/Export MLA Aakib F. Bagwan, Bharti A. Gupta , Bhagyashri M. Dhole, Prof. Ashvini Y. Bhamare, “Web Based Image search Using Semantic Signature Re-ranking Technique”, January 15 Volume 3 Issue 1 , International Journal on Recent... more
    • by 
    •   23  
      EngineeringElectronic EngineeringControl Systems EngineeringTelecommunications Engineering
There has been a growing trend to use the cloud for largescale data storage. It has raised the important security issue of controlling and preventing any unauthorized access of data stored in the cloud. The role-based access control... more
    • by 
    •   2  
      Cloud ComputingCloud Computing Security
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies... more
    • by 
    •   9  
      Cloud ComputingMobile Cloud ComputingEnabling Technologies to Cloud ComputingCloud Computing Security