메뉴 건너뛰기




Volumn , Issue , 2011, Pages 784-791

MCDB: Using multi-clouds to ensure security in cloud computing

Author keywords

Cloud computing; cloud storage; data integrity; Database as a service; multi clouds; single cloud

Indexed keywords

CLOUD SERVICES; COLLATERAL DAMAGE; COMPUTING ENVIRONMENTS; DATA INTEGRITY; DATA SECURITY AND PRIVACY; DATABASE AS A SERVICE; DATABASE MODELS; MALICIOUS INSIDERS; MULTI-CLOUDS; SECURITY FACTORS; SECURITY RESEARCH; SERVICE AVAILABILITY; SERVICE PROVIDER;

EID: 84856080479     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DASC.2011.133     Document Type: Conference Paper
Times cited : (68)

References (33)
  • 8
    • 84855198855 scopus 로고    scopus 로고
    • P. BNA. 03/09/2009. Copyright 2009 by The Bureau of National Affairs, Inc. (800-372-1033)
    • P. BNA. Privacy & security law report, 03/09/2009. Copyright 2009 by The Bureau of National Affairs, Inc. (800-372-1033), 2009
    • (2009) Privacy & Security Law Report
  • 11
    • 84856090929 scopus 로고    scopus 로고
    • Dependable storage in the Intercloud
    • C. Cachin, R. Haas and M. Vukolic, Dependable storage in the Intercloud, Research Report RZ, 3783 (2010), pp. 1-6.
    • (2010) Research Report RZ , vol.3783 , pp. 1-6
    • Cachin, C.1    Haas, R.2    Vukolic, M.3
  • 14
    • 84856093972 scopus 로고    scopus 로고
    • Security in the cloud
    • Clavister
    • Clavister, Security in the cloud, Clavister White Paper (2008), pp. 1-6.
    • (2008) Clavister White Paper , pp. 1-6
  • 15
    • 3042823619 scopus 로고    scopus 로고
    • Email-based identification and authentication: An alternative to PKI?
    • S. L. Garfinkel, Email-based identification and authentication: An alternative to PKI?, IEEE Security and Privacy (2003), pp. 20-26.
    • (2003) IEEE Security and Privacy , pp. 20-26
    • Garfinkel, S.L.1
  • 20
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • L. M. Kaufman, Data security in the world of cloud computing, IEEE Security & Privacy (2009), pp. 61-64.
    • (2009) IEEE Security & Privacy , pp. 61-64
    • Kaufman, L.M.1
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Commun. ACM, 22 (1979), pp. 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 28
    • 84856093041 scopus 로고    scopus 로고
    • Sun, http://blogs.sun.com/gbrunett/entry/amazon-s3-silent-data- corruption.
  • 29
    • 78650065157 scopus 로고    scopus 로고
    • Security and Privacy Challenges in Cloud Computing Environments
    • IEEE
    • H. Takabi, J. B. D. Joshi and G. Ahn, Security and Privacy Challenges in Cloud Computing Environments, Security & Privacy, IEEE, 8 (2010), pp. 24-31.
    • (2010) Security & Privacy , vol.8 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.3
  • 31
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • J. Viega, Cloud computing and the common man, Computer, 42 (2009), pp. 106-108.
    • (2009) Computer , vol.42 , pp. 106-108
    • Viega, J.1
  • 32
    • 79955805332 scopus 로고    scopus 로고
    • The Byzantine empire in the intercloud
    • M. Vukolic The Byzantine empire in the intercloud, ACM SIGACT News, 41 (2010), pp. 105-111.
    • (2010) ACM SIGACT News , vol.41 , pp. 105-111
    • Vukolic, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.