Controlling data in the cloud: outsourcing computation without outsourcing control

  title={Controlling data in the cloud: outsourcing computation without outsourcing control},
  author={Richard Chow and Philippe Golle and Markus Jakobsson and Elaine Shi and Jessica Staddon and Ryusuke Masuoka and Jesus Molina},
Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe… CONTINUE READING
Highly Influential
This paper has highly influenced 24 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 692 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 408 extracted citations

Towards Secure and Dependable Cloud Storage Based on User-Defined Workflows

2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing • 2015
View 6 Excerpts
Highly Influenced

Policy Based Security Middleware as a Service

2014 International Conference on Future Internet of Things and Cloud • 2014
View 4 Excerpts
Highly Influenced

Security-Awareness in Network Virtualization: A Classified Overview

2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems • 2014
View 6 Excerpts
Highly Influenced

Cloud Computing Service Security and Access: From the Providers and Customers' Perspective

2013 International Conference on Information Technology and Applications • 2013
View 6 Excerpts
Highly Influenced

Security issues in cloud environments: a survey

International Journal of Information Security • 2013
View 9 Excerpts
Highly Influenced

An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks

2012 SC Companion: High Performance Computing, Networking Storage and Analysis • 2012
View 4 Excerpts
Highly Influenced

692 Citations

Citations per Year
Semantic Scholar estimates that this publication has 692 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…