1 - 4 of 4 Chapters
[Cloud computing is a trend in the Internet-based computing, providing on-demand shared processing and data storage resources to remote computing devices. It is able to empower resource-scarce devices to provide end users highly demanding applications, enabling access to data and sophisticated...
[Technological and advanced systems, such as cloud computing, suffer different kinds of attacks, be it a small, medium, or large cloud solution provider. In fact, the size of the cloud provider does not avoid it from suffering a cyber attack. Most of these attacks are common and already...
[In this chapter, the most applicable cloud storage security mechanisms are introduced. The chapter can be used as a reference to a set of cloud security solutions. The mechanisms are grouped according to the related security task or problem:]
[This chapter presents a model and step-by-step systematic construction of the cloud storage protection system. The formal model allows to make the whole process of deploying the security system transparent and easily verifiable. The systematic construction methodology aims to optimize the...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.