Corpus ID: 34539592

Addressing Data Security in the Cloud T

@inproceedings{Mircea2012AddressingDS,
  title={Addressing Data Security in the Cloud T},
  author={Marinela Mircea},
  year={2012}
}
841 Abstract—The development of information and communication technology, the increased use of the internet, as well as the effects of the recession within the last years, have lead to the increased use of cloud computing based solutions, also called on-demand solutions. These solutions offer a large number of benefits to organizations as well as challenges and risks, mainly determined by data visualization in different geographic locations on the internet. As far as the specific risks of cloud… Expand

Figures and Tables from this paper

Cloud computing authentication using cancellable biometrics
TLDR
This paper proposes to use a cancellable biometric authentication system, in which a distorted biometric image, derived from the original, is used for authentication and a data hiding technique is used to embed demographic information in theBiometric image. Expand

References

SHOWING 1-10 OF 30 REFERENCES
A survey on security issues in service delivery models of cloud computing
TLDR
A survey of the different security risks that pose a threat to the cloud is presented and a new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. Expand
Addressing cloud computing security issues
TLDR
This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. Expand
Commentary: Cloud computing - A security problem or solution?
TLDR
The move to cloud computing is the next stage of an unstoppable trend in the breakdown of the enterprise perimeter, both technically and organisationally, and the compartmentalisation introduced by migrating to cloud services could result in much improved security. Expand
Internet cloud security: The illusion of inclusion
TLDR
This article will describe and discuss cloud computing technology and examine what the cloud pioneers Apple, Google and Amazon are doing to safeguard the cloud and how they cope with the illusion of inclusion. Expand
Positive perspectives on cloud security
  • P. Wilson
  • Computer Science
  • Inf. Secur. Tech. Rep.
  • 2011
TLDR
The overriding benefits from cloud computing are such that businesses could face real challenges in future if they resist adoption and so the risks need to be faced with a more positive outlook given this more balanced view. Expand
Security+ Guide to Network Security Fundamentals
TLDR
Cutting-edge coverage of the new edition includes virtualization, mobile devices, and other trends, as well as new topics such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. Expand
Toward Risk Assessment as a Service in Cloud Environments
TLDR
Security and privacy assessments are considered a best practice for evaluating a system or application for potential risks and exposures and recommending introducing risk assessment as a service to address these challenges. Expand
Using Cloud Computing in Higher Education: A Strategy to Improve Agility in the Current Financial Crisis
TLDR
The research methodology consisted in a rigorous analysis of the latest research on Cloud Computing as an alternative to IT provision, management and security, plus the authors’ experience in IT and higher education to find alternatives to the use of IT, while leading universities to improve agility and obtain savings. Expand
Opportunities and threats: A security assessment of state e-government websites
TLDR
The findings indicate that most state e-government sites posted privacy and security policy statements; however, only less than half stated clearly what security measures were in action. Expand
The Bucharest Academy of Economic Studies COMBINING BUSINESS INTELLIGENCE WITH CLOUD COMPUTING TO DELIVERY AGILITY IN ACTUAL ECONOMY
The present economic crisis experienced by all the states of the world orients more and more the information technology industry towards efficiency. One of the instruments that can provide efficiencyExpand
...
1
2
3
...