Secure provenance: the essential of bread and butter of data forensics in cloud computing
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Data protection models for service provisioning in the cloud
Proceedings of the 15th ACM symposium on Access control models and technologies
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
The smart internet as a catalyst for health care reform
The smart internet
The smart internet as a catalyst for health care reform
The smart internet
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
A Read-Only Distributed Hash Table
Journal of Grid Computing
Security requirements for a cyber physical community system: a case study
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Discovering software process and product quality criteria in software as a service
PROFES'10 Proceedings of the 11th international conference on Product-Focused Software Process Improvement
Client classification policies for SLA negotiation and allocation in shared cloud datacenters
GECON'11 Proceedings of the 8th international conference on Economics of Grids, Clouds, Systems, and Services
Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Different facets of security in the cloud
Proceedings of the 15th Communications and Networking Simulation Symposium
Security analysis of public cloud computing
International Journal of Communication Networks and Distributed Systems
Reference deployment models for eliminating user concerns on cloud security
The Journal of Supercomputing
SAPDS: self-healing attribute-based privacy aware data sharing in cloud
The Journal of Supercomputing
A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management
Journal of Network and Systems Management
Gaining the profits of cloud computing in a public authority environment
International Journal of Computational Science and Engineering
The Charité Grid Portal: User-friendly and Secure Access to Grid-based Resources and Services
Journal of Grid Computing
Privacy-aware searching with oblivious term matching for cloud storage
The Journal of Supercomputing
On local separation of processing and storage in infrastructure-as-a-service
GECON'12 Proceedings of the 9th international conference on Economics of Grids, Clouds, Systems, and Services
Trust beyond reputation: A computational trust model based on stereotypes
Electronic Commerce Research and Applications
Survey of the State-of-the-Art of Cloud Computing
International Journal of Cloud Applications and Computing
Cloud Computing Services: Theoretical Foundations of Ethical and Entrepreneurial Adoption Behaviour
International Journal of Cloud Applications and Computing
Privacy and anonymity in untrusted data stores
ADC '11 Proceedings of the Twenty-Second Australasian Database Conference - Volume 115
Internet of Things (IoT): A vision, architectural elements, and future directions
Future Generation Computer Systems
Security vulnerabilities from inside and outside the Eucalyptus cloud
Proceedings of the 6th Balkan Conference in Informatics
Toward designing a secure biosurveillance cloud
The Journal of Supercomputing
On secure data sharing in cloud environment
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Privacy Preserving Index for Encrypted Electronic Medical Records
Journal of Medical Systems
From Service Oriented to Cloud Powered Manufacturing Systems
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.00 |
Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. In this new world of computing, users are universally required to accept the underlying premise of trust. Within the cloud computing world, the virtual environment lets users access computing power that exceeds that contained within their own physical worlds. Typically, users will know neither the exact location of their data nor the other sources of the data collectively stored with theirs. The data you can find in a cloud ranges from public source, which has minimal security concerns, to private data containing highly sensitive information (such as social security numbers, medical records, or shipping manifests for hazardous material). Does using a cloud environment alleviate the business entities of their responsibility to ensure that proper security measures are in place for both their data and applications, or do they share joint responsibility with service providers? The answers to this and other questions lie within the realm of yet-to-be-written law. As with most technological advances, regulators are typically in a "catch-up" mode to identify policy, governance, and law. Cloud computing presents an extension of problems heretofore experienced with the Internet. To ensure that such decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.