메뉴 건너뛰기




Volumn , Issue , 2013, Pages 621-628

Cloud-as-a-gift: Effectively exploiting personal cloud free accounts via rest APIs

Author keywords

Cloud Storage; Personal Clouds; Security

Indexed keywords

CLOUD STORAGE SERVICES; CLOUD STORAGES; FILE SHARING APPLICATION; PERSONAL CLOUDS; POTENTIAL IMPACTS; SECURITY; STORAGE INFRASTRUCTURE; UNINTENDED CONSEQUENCES;

EID: 84897704559     PISSN: 21596182     EISSN: 21596190     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2013.47     Document Type: Conference Paper
Times cited : (15)

References (17)
  • 2
    • 84897737369 scopus 로고    scopus 로고
    • [Online]. Available (service)
    • [Online]. Available: http://en.wikipedia.org/wiki/Dropbox (service)
  • 4
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
  • 6
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on iaas cloud security
    • L. Vaquero, L. Rodero-Merino, and D. Moŕan, "Locking the sky: a survey on iaas cloud security," Computing, vol. 91, pp. 93-118, 2011.
    • (2011) Computing , vol.91 , pp. 93-118
    • Vaquero, L.1    Rodero-Merino, L.2    Moŕan, D.3
  • 7
    • 80053144966 scopus 로고    scopus 로고
    • Exploiting cloud utility models for profit and ruin
    • july
    • J. Idziorek and M. Tannian, "Exploiting cloud utility models for profit and ruin," in IEEE CLOUD'11, july 2011, pp. 33-40.
    • (2011) IEEE CLOUD'11 , pp. 33-40
    • Idziorek, J.1    Tannian, M.2
  • 8
    • 84866747256 scopus 로고    scopus 로고
    • Attribution of fraudulent resource consumption in the cloud
    • J. Idziorek, M. Tannian, and D. Jacobson, "Attribution of fraudulent resource consumption in the cloud," in IEEE CLOUD'12, 2012, pp. 99-106.
    • (2012) IEEE CLOUD'12 , pp. 99-106
    • Idziorek, J.1    Tannian, M.2    Jacobson, D.3
  • 9
    • 84863932631 scopus 로고    scopus 로고
    • Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
    • M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E.Weippl., "Dark clouds on the horizon: Using cloud storage as attack vector and online slack space," in USENIX Security, 2011, pp. 5-8.
    • (2011) USENIX Security , pp. 5-8
    • Mulazzani, M.1    Schrittwieser, S.2    Leithner, M.3    Huber, M.4    Weippl, E.5
  • 10
    • 80052904180 scopus 로고    scopus 로고
    • Emfs: Email-based personal cloud storage
    • J. Srinivasan, W. Wei, X. Ma, and T. Yu, "Emfs: Email-based personal cloud storage," in NAS'11, 2011, pp. 248-257.
    • (2011) NAS'11 , pp. 248-257
    • Srinivasan, J.1    Wei, W.2    Ma, X.3    Yu, T.4
  • 12
    • 56749181040 scopus 로고    scopus 로고
    • A seamless and reliable distributed network file system utilizing webspace
    • H.-C. Chao, T.-J. Liu, K.-H. Chen, and C.-R. Dow, "A seamless and reliable distributed network file system utilizing webspace," in WSE'08, 2008, pp. 65-68.
    • (2008) WSE'08 , pp. 65-68
    • Chao, H.-C.1    Liu, T.-J.2    Chen, K.-H.3    Dow, C.-R.4
  • 14
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • J. R. Douceur, "The sybil attack," in IPTPS'01, 2002, pp. 251-260.
    • (2002) IPTPS'01 , pp. 251-260
    • Douceur, J.R.1
  • 17
    • 0030704545 scopus 로고    scopus 로고
    • Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web
    • D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin, "Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web," in ACM STOC'97, 1997, pp. 654-663.
    • (1997) ACM STOC'97 , pp. 654-663
    • Karger, D.1    Lehman, E.2    Leighton, T.3    Panigrahy, R.4    Levine, M.5    Lewin, D.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.