메뉴 건너뛰기




Volumn 305, Issue , 2015, Pages 357-383

Security in cloud computing: Opportunities and challenges

Author keywords

Cloud computing; Multi tenancy; Security; Virtualization; Web services

Indexed keywords

CLOUD COMPUTING; COST EFFECTIVENESS; MOBILE CLOUD COMPUTING; SURVEYS; VIRTUALIZATION;

EID: 84924368818     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2015.01.025     Document Type: Article
Times cited : (661)

References (130)
  • 1
    • 84904352832 scopus 로고    scopus 로고
    • A review on the state-of-the-art privacy preserving approaches in e-health clouds
    • A. Abbas, and S.U. Khan A review on the state-of-the-art privacy preserving approaches in e-health clouds IEEE J. Biomed. Health Inform. 2014 10.1109/JBHI.2014.2300846
    • (2014) IEEE J. Biomed. Health Inform.
    • Abbas, A.1    Khan, S.U.2
  • 2
    • 84911413802 scopus 로고    scopus 로고
    • A cloud based health insurance plan recommendation system: A user centered approach
    • A. Abbas, K. Bilal, L. Zhang, and S.U. Khan A cloud based health insurance plan recommendation system: a user centered approach Future Gener. Comput. Syst. 2014 10.1016/j.future.2014.08.010
    • (2014) Future Gener. Comput. Syst.
    • Abbas, A.1    Bilal, K.2    Zhang, L.3    Khan, S.U.4
  • 13
    • 70350357342 scopus 로고    scopus 로고
    • Attribute-sets: A practically motivated enhancement to attribute-based encryption
    • Springer Berlin, Heidelberg
    • R. Bobba, H. Khurana, and M. Prabhakaran Attribute-sets: a practically motivated enhancement to attribute-based encryption Computer Security ESORICS 2009 Springer Berlin, Heidelberg 587 604
    • (2009) Computer Security ESORICS , pp. 587-604
    • Bobba, R.1    Khurana, H.2    Prabhakaran, M.3
  • 15
    • 84924361877 scopus 로고    scopus 로고
    • Cryptographic key management issues and challenges in cloud services
    • Springer New York doi: 10.1007/978-1-4614-9278-8-1
    • R. Chandramouli, M. Iorga, and S. Chokhani Cryptographic key management issues and challenges in cloud services Secure Cloud Computing 2014 Springer New York 1 30 doi: 10.1007/978-1-4614-9278-8-1
    • (2014) Secure Cloud Computing , pp. 1-30
    • Chandramouli, R.1    Iorga, M.2    Chokhani, S.3
  • 16
    • 84861921092 scopus 로고    scopus 로고
    • Optimization of resource provisioning cost in cloud computing
    • S. Chaisiri, B. Lee, and D. Niyato Optimization of resource provisioning cost in cloud computing IEEE Trans. Services Comput. 5 2 2012 164 177
    • (2012) IEEE Trans. Services Comput. , vol.5 , Issue.2 , pp. 164-177
    • Chaisiri, S.1    Lee, B.2    Niyato, D.3
  • 18
    • 84863408597 scopus 로고    scopus 로고
    • Study on the security models and strategies of cloud computing
    • J. Che, Y. Duan, T. Zhang, and J. Fan Study on the security models and strategies of cloud computing Proc. Eng. 23 2011 586 593
    • (2011) Proc. Eng. , vol.23 , pp. 586-593
    • Che, J.1    Duan, Y.2    Zhang, T.3    Fan, J.4
  • 19
    • 84863469103 scopus 로고    scopus 로고
    • Spicesimple privacy-preserving identity-management for cloud environment
    • Springer Berlin, Heidelberg
    • S.M.S. Chow, Y. He, L.C.K. Hui, and S.M. Yiu Spicesimple privacy-preserving identity-management for cloud environment Applied Cryptography and Network Security 2012 Springer Berlin, Heidelberg 526 543
    • (2012) Applied Cryptography and Network Security , pp. 526-543
    • Chow, S.M.S.1    He, Y.2    Hui, L.C.K.3    Yiu, S.M.4
  • 24
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • H.T. Dinh, C. Lee, D. Niyato, and P. Wang A survey of mobile cloud computing: architecture, applications, and approaches Wireless Commun. Mobile Comput. 13 18 2013 1587 1611
    • (2013) Wireless Commun. Mobile Comput. , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 25
    • 84871003529 scopus 로고    scopus 로고
    • A survey on service-oriented network virtualization toward convergence of networking and cloud computing
    • Q. Duan, Y. Yan, and A.V. Vasilakos A survey on service-oriented network virtualization toward convergence of networking and cloud computing IEEE Trans. Netw. Service Manage. 9 4 2012 373 392
    • (2012) IEEE Trans. Netw. Service Manage. , vol.9 , Issue.4 , pp. 373-392
    • Duan, Q.1    Yan, Y.2    Vasilakos, A.V.3
  • 30
    • 84924706348 scopus 로고    scopus 로고
    • Stealthy denial of service strategy in cloud computing
    • M. Ficco, and M. Rak Stealthy denial of service strategy in cloud computing IEEE Trans. Cloud Comput. 2014 10.1109/TCC.2014.2325045
    • (2014) IEEE Trans. Cloud Comput.
    • Ficco, M.1    Rak, M.2
  • 34
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Springer Berlin, Heidelberg
    • J. Groth, and Amit Sahai Efficient non-interactive proof systems for bilinear groups Advances in Cryptology EUROCRYPT 2008 Springer Berlin, Heidelberg 415 432
    • (2008) Advances in Cryptology EUROCRYPT , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 35
    • 84908394684 scopus 로고    scopus 로고
    • CIVSched: A communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs
    • B. Guan, J. Wu, Y. Wang, and S.U. Khan CIVSched: a communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs IEEE Trans. Cloud Comput. 2 3 2014 320 332
    • (2014) IEEE Trans. Cloud Comput. , vol.2 , Issue.3 , pp. 320-332
    • Guan, B.1    Wu, J.2    Wang, Y.3    Khan, S.U.4
  • 38
    • 84888049317 scopus 로고    scopus 로고
    • Building a compliance vocabulary to embed security controls in cloud SLAs
    • M.L. Hale, R. Gamble, Building a compliance vocabulary to embed security controls in cloud SLAs, in: IEEE Ninth World Congress on Services (SERVICES), 2013, pp. 118-125.
    • (2013) IEEE Ninth World Congress on Services (SERVICES) , pp. 118-125
    • Hale, M.L.1    Gamble, R.2
  • 41
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • T.D. Hoang, C. Lee, D. Niyato, and P. Wang A survey of mobile cloud computing: architecture, applications, and approaches Wireless Commun. Mobile Comput. 13 18 2013 1587 1611
    • (2013) Wireless Commun. Mobile Comput. , vol.13 , Issue.18 , pp. 1587-1611
    • Hoang, T.D.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 42
    • 84888310699 scopus 로고    scopus 로고
    • Improving cloud network security using the tree-rule firewall
    • X. He, T. Chomsiri, P. Nanda, and Z. Tan Improving cloud network security using the tree-rule firewall Future Gener. Comput. Syst. 30 2014 116 126
    • (2014) Future Gener. Comput. Syst. , vol.30 , pp. 116-126
    • He, X.1    Chomsiri, T.2    Nanda, P.3    Tan, Z.4
  • 49
    • 84898466331 scopus 로고    scopus 로고
    • Potential attacks against k-anonymity on LBS and solutions for defending the attacks
    • Springer Berlin, Heidelberg
    • P. Juncheng, D. Huimin, S. Yinghui, and L. Dong Potential attacks against k-anonymity on LBS and solutions for defending the attacks Advanced in Computer Science and its Applications 2014 Springer Berlin, Heidelberg 877 883
    • (2014) Advanced in Computer Science and Its Applications , pp. 877-883
    • Juncheng, P.1    Huimin, D.2    Yinghui, S.3    Dong, L.4
  • 50
    • 84919829652 scopus 로고    scopus 로고
    • Control cloud data access privilege and anonymity with fully anonymous attribute based encryption
    • T. Jung, X. Li, Z. Wan, and M. Wan Control cloud data access privilege and anonymity with fully anonymous attribute based encryption IEEE Trans. Inform. Forensics Sec. 10 1 2014 190 199
    • (2014) IEEE Trans. Inform. Forensics Sec. , vol.10 , Issue.1 , pp. 190-199
    • Jung, T.1    Li, X.2    Wan, Z.3    Wan, M.4
  • 52
    • 84919877569 scopus 로고    scopus 로고
    • BSS: Block-based sharing scheme for secure data storage services in mobile cloud environment
    • A.N. Khan, M.L.M. Kiah, M. Ali, S.A. Madani, and S. Shamshirband BSS: block-based sharing scheme for secure data storage services in mobile cloud environment J. Supercomput. 70 2 2014 946 976
    • (2014) J. Supercomput. , vol.70 , Issue.2 , pp. 946-976
    • Khan, A.N.1    Kiah, M.L.M.2    Ali, M.3    Madani, S.A.4    Shamshirband, S.5
  • 53
    • 84901987724 scopus 로고    scopus 로고
    • Incremental proxy re-encryption scheme for mobile cloud computing environment
    • A.N. Khan, M.L.M. Kiah, S.A. Madani, M. Ali, and S. Shamshirband Incremental proxy re-encryption scheme for mobile cloud computing environment J. Supercomput. 68 2 2014 624 651
    • (2014) J. Supercomput. , vol.68 , Issue.2 , pp. 624-651
    • Khan, A.N.1    Kiah, M.L.M.2    Madani, S.A.3    Ali, M.4    Shamshirband, S.5
  • 54
    • 84888011760 scopus 로고    scopus 로고
    • Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
    • A.N. Khan, M.L.M. Kiah, S.A. Madani, and M. Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing J. Supercomput. 66 3 2013 1687 1706
    • (2013) J. Supercomput. , vol.66 , Issue.3 , pp. 1687-1706
    • Khan, A.N.1    Kiah, M.L.M.2    Madani, S.A.3    Ali, M.4
  • 57
    • 84899798215 scopus 로고    scopus 로고
    • Cloud computing risk assessment: A systematic literature review
    • Springer Berlin, Heidelberg
    • R. Latif, H. Abbas, S. Assar, and Q. Ali Cloud computing risk assessment: a systematic literature review Future Information Technology 2014 Springer Berlin, Heidelberg 285 295
    • (2014) Future Information Technology , pp. 285-295
    • Latif, R.1    Abbas, H.2    Assar, S.3    Ali, Q.4
  • 58
    • 84870937861 scopus 로고    scopus 로고
    • A trusted virtual machine in an untrusted management environment
    • C. Li, A. Raghunathan, and N.K. Jha A trusted virtual machine in an untrusted management environment IEEE Trans. Serv. Comput. 5 4 2012 472 483
    • (2012) IEEE Trans. Serv. Comput. , vol.5 , Issue.4 , pp. 472-483
    • Li, C.1    Raghunathan, A.2    Jha, N.K.3
  • 59
    • 80053654165 scopus 로고    scopus 로고
    • Cyber-guarder: A virtualization security assurance architecture for green cloud computing
    • J. Li, B. Li, T. Wo, C. Hu, J. Huai, L. Liu, and K.P. Lam Cyber-guarder: a virtualization security assurance architecture for green cloud computing Future Gener. Comput. Syst. 28 2 2012 379 390
    • (2012) Future Gener. Comput. Syst. , vol.28 , Issue.2 , pp. 379-390
    • Li, J.1    Li, B.2    Wo, T.3    Hu, C.4    Huai, J.5    Liu, L.6    Lam, K.P.7
  • 60
    • 84860512062 scopus 로고    scopus 로고
    • A secure erasure code-based cloud storage system with secure data forwarding
    • H.Y. Lin, and W.G. Tzeng A secure erasure code-based cloud storage system with secure data forwarding IEEE Trans. Parallel Distrib. Syst. 23 6 2012 995 1003
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.6 , pp. 995-1003
    • Lin, H.Y.1    Tzeng, W.G.2
  • 63
    • 84897585107 scopus 로고    scopus 로고
    • Gearing resource-poor mobile devices with powerful clouds: Architectures, challenges, and applications
    • F. Liu, P. Shu, H. Jin, L. Ding, J. Yu, D. Niu, and B. Li Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications IEEE Wireless Commun. 20 3 2013
    • (2013) IEEE Wireless Commun. , vol.20 , Issue.3
    • Liu, F.1    Shu, P.2    Jin, H.3    Ding, L.4    Yu, J.5    Niu, D.6    Li, B.7
  • 64
    • 84889079354 scopus 로고    scopus 로고
    • Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    • Q. Liu, G. Wang, and J. Wu Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Inform. Sci. 258 2014 355 370
    • (2014) Inform. Sci. , vol.258 , pp. 355-370
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 65
    • 84919493206 scopus 로고    scopus 로고
    • Security-aware intermediate data placement strategy in scientific cloud workflows
    • W. Liu, S. Peng, W. Du, W. Wang, and G.S. Zeng Security-aware intermediate data placement strategy in scientific cloud workflows Knowl. Inform. Syst. 41 2 2014 423 447
    • (2014) Knowl. Inform. Syst. , vol.41 , Issue.2 , pp. 423-447
    • Liu, W.1    Peng, S.2    Du, W.3    Wang, W.4    Zeng, G.S.5
  • 66
    • 84873699606 scopus 로고    scopus 로고
    • Performance implications of multi-tier application deployments on Infrastructure-as-a-Service clouds: Towards performance modeling
    • W. Lloyd, S. Pallickara, O. David, J. Lyon, M. Arabi, and K. Rojas Performance implications of multi-tier application deployments on Infrastructure-as-a-Service clouds: towards performance modeling Future Gener. Comput. Syst. 29 5 2013 1254 1264
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.5 , pp. 1254-1264
    • Lloyd, W.1    Pallickara, S.2    David, O.3    Lyon, J.4    Arabi, M.5    Rojas, K.6
  • 67
    • 78650558794 scopus 로고    scopus 로고
    • Secure virtualization for cloud computing
    • F. Lombardi, and R.D. Pietro Secure virtualization for cloud computing J. Netw. Comput. Appl. 34 4 2011 1113 1122
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.4 , pp. 1113-1122
    • Lombardi, F.1    Pietro, R.D.2
  • 69
    • 84861307113 scopus 로고    scopus 로고
    • The NIST definition of cloud computing (draft)
    • P. Mell, and T. Grance The NIST definition of cloud computing (draft) NIST Special Publ. 800 145 2011 7
    • (2011) NIST Special Publ. , vol.800 , Issue.145 , pp. 7
    • Mell, P.1    Grance, T.2
  • 70
    • 84979819188 scopus 로고    scopus 로고
    • CloudGenius: A hybrid decision support method for automating the migration of web application clusters to public clouds
    • M. Menzel, R. Ranjan, L. Wang, S.U. Khan, and J. Chen CloudGenius: a hybrid decision support method for automating the migration of web application clusters to public clouds IEEE Trans. Comput. 2014 10.1109/TC.2014.2317188
    • (2014) IEEE Trans. Comput.
    • Menzel, M.1    Ranjan, R.2    Wang, L.3    Khan, S.U.4    Chen, J.5
  • 71
    • 84886723209 scopus 로고    scopus 로고
    • A survey on security issues and solutions at different layers of Cloud computing
    • C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan A survey on security issues and solutions at different layers of Cloud computing J. Supercomput. 63 2 2013 561 592
    • (2013) J. Supercomput. , vol.63 , Issue.2 , pp. 561-592
    • Modi, C.1    Patel, D.2    Borisaniya, B.3    Patel, A.4    Rajarajan, M.5
  • 73
    • 84925357591 scopus 로고    scopus 로고
    • A broker-based cooperative security-SLA evaluation methodology for personal cloud computing
    • S.H. Na, and E.N. Huh A broker-based cooperative security-SLA evaluation methodology for personal cloud computing Sec. Commun. Netw. 2014 10.1002/sec.1086
    • (2014) Sec. Commun. Netw.
    • Na, S.H.1    Huh, E.N.2
  • 75
    • 84924384302 scopus 로고    scopus 로고
    • Open Web Application Security Project Top 10-2013, The ten most critical Web application security risks, < > Top 10 for 2013 (accessed 08.04.14)
    • Open Web Application Security Project Top 10-2013, The ten most critical Web application security risks, < https://www.owasp.org/index.php/Top10]OWASP > Top 10 for 2013 (accessed 08.04.14).
  • 76
    • 84864368309 scopus 로고    scopus 로고
    • Improving virtualization security by splitting hypervisor into smaller components
    • Springer Berlin, Heidelberg
    • W. Pan, Y. Zhang, M. Yu, and J. Jing Improving virtualization security by splitting hypervisor into smaller components Data and Applications Security and Privacy XXVI 2012 Springer Berlin, Heidelberg 298 313
    • (2012) Data and Applications Security and Privacy XXVI , pp. 298-313
    • Pan, W.1    Zhang, Y.2    Yu, M.3    Jing, J.4
  • 78
    • 84890479671 scopus 로고    scopus 로고
    • A mechanism design approach to resource procurement in cloud computing
    • A. Prasad, and S. Rao A mechanism design approach to resource procurement in cloud computing IEEE Trans. Comput. 63 1 2014 17 30
    • (2014) IEEE Trans. Comput. , vol.63 , Issue.1 , pp. 17-30
    • Prasad, A.1    Rao, S.2
  • 80
    • 84937828887 scopus 로고    scopus 로고
    • Heuristics based server consolidation with residual resource defragmentation in cloud data centers
    • K.S. Rao, and P.S. Thilagam Heuristics based server consolidation with residual resource defragmentation in cloud data centers Future Gener. Comput. Syst. 2014 10.1016/j.future.2014.09.009
    • (2014) Future Gener. Comput. Syst.
    • Rao, K.S.1    Thilagam, P.S.2
  • 83
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • K. Ren, C. Wang, and Q. Wang Security challenges for the public cloud IEEE Internet Comput. 16 1 2012 69 73
    • (2012) IEEE Internet Comput. , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 85
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • C. Rong, S.T. Nguyen, and M.G. Jaatun Beyond lightning: a survey on security challenges in cloud computing Comput. Electr. Eng. 39 1 2013 47 54
    • (2013) Comput. Electr. Eng. , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 86
    • 84891761004 scopus 로고    scopus 로고
    • Decentralized access control with anonymous authentication of data stored in clouds
    • S. Ruj, M. Stojmenovic, and A. Nayak Decentralized access control with anonymous authentication of data stored in clouds IEEE Trans. Parallel Distrib. Syst. 25 2 2014 384 394
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.2 , pp. 384-394
    • Ruj, S.1    Stojmenovic, M.2    Nayak, A.3
  • 87
    • 84881472688 scopus 로고    scopus 로고
    • Cloud computing security: The scientific challenge, and a survey of solutions
    • M.D. Ryan Cloud computing security: the scientific challenge, and a survey of solutions J. Syst. Softw. 86 09 2013 2263 2268
    • (2013) J. Syst. Softw. , vol.86 , Issue.9 , pp. 2263-2268
    • Ryan, M.D.1
  • 88
    • 84892583408 scopus 로고    scopus 로고
    • Cloud computing: Opportunities and challenges
    • M. Sadiku, S. Musa, and O. Momoh Cloud computing: opportunities and challenges IEEE Potentials 33 1 2014 34 36
    • (2014) IEEE Potentials , vol.33 , Issue.1 , pp. 34-36
    • Sadiku, M.1    Musa, S.2    Momoh, O.3
  • 89
    • 80053489634 scopus 로고    scopus 로고
    • Reconciliation of the cloud computing model with US federal electronic health record regulations
    • E. Schweitzer Reconciliation of the cloud computing model with US federal electronic health record regulations J. Am. Med. Inform. Assoc. 19 2 2012 161 165
    • (2012) J. Am. Med. Inform. Assoc. , vol.19 , Issue.2 , pp. 161-165
    • Schweitzer, E.1
  • 94
    • 84924403473 scopus 로고    scopus 로고
    • On-demand security architecture for cloud computing
    • K. Sankar, S. Kannan, and P. Jennifer On-demand security architecture for cloud computing Middle-East J. Sci. Res. 20 2 2014 241 246
    • (2014) Middle-East J. Sci. Res. , vol.20 , Issue.2 , pp. 241-246
    • Sankar, K.1    Kannan, S.2    Jennifer, P.3
  • 95
    • 84894675432 scopus 로고    scopus 로고
    • Heterogeneity in mobile cloud computing: Taxonomy and open challenges
    • Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya Heterogeneity in mobile cloud computing: taxonomy and open challenges IEEE Commun. Surveys Tutorials 16 1 2014 369 392
    • (2014) IEEE Commun. Surveys Tutorials , vol.16 , Issue.1 , pp. 369-392
    • Sanaei, Z.1    Abolfazli, S.2    Gani, A.3    Buyya, R.4
  • 97
    • 84905815184 scopus 로고    scopus 로고
    • Analysis of risks for virtualization technology
    • M.H. Song, Analysis of risks for virtualization technology, in: Applied Mechanics and Materials, vol. 539, 2014, pp. 374-377.
    • (2014) Applied Mechanics and Materials , vol.539 , pp. 374-377
    • Song, M.H.1
  • 98
    • 84867509247 scopus 로고    scopus 로고
    • A combined approach to ensure data security in cloud computing
    • S.K. Sood A combined approach to ensure data security in cloud computing J. Netw. Comput. Appl. 35 6 2012 1831 1838
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.6 , pp. 1831-1838
    • Sood, S.K.1
  • 99
    • 84901607854 scopus 로고    scopus 로고
    • A review on remote data auditing in single cloud server: Taxonomy and open issues
    • M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M.K. Khan A review on remote data auditing in single cloud server: taxonomy and open issues J. Netw. Comput. Appl. 43 2014 121 141
    • (2014) J. Netw. Comput. Appl. , vol.43 , pp. 121-141
    • Sookhak, M.1    Talebian, H.2    Ahmed, E.3    Gani, A.4    Khan, M.K.5
  • 101
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 104
    • 84961665186 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • Z. Tari Security and privacy in cloud computing IEEE Cloud Comput. 1 1 2014 54 57
    • (2014) IEEE Cloud Comput. , vol.1 , Issue.1 , pp. 54-57
    • Tari, Z.1
  • 105
    • 84865500482 scopus 로고    scopus 로고
    • A framework for security context migration in a firewall secured virtual machine environment
    • Springer Berlin, Heidelberg
    • Z. Tavakoli, S. Meier, and A. Vensmer A framework for security context migration in a firewall secured virtual machine environment Information and Communication Technologies 2012 Springer Berlin, Heidelberg 41 51
    • (2012) Information and Communication Technologies , pp. 41-51
    • Tavakoli, Z.1    Meier, S.2    Vensmer, A.3
  • 106
    • 84896399206 scopus 로고    scopus 로고
    • Counteracting security attacks in virtual machines in the cloud using property based attestation
    • V. Varadharajan, and U. Tupakula Counteracting security attacks in virtual machines in the cloud using property based attestation J. Network Comput. Appl. 40 2014 31 45
    • (2014) J. Network Comput. Appl. , vol.40 , pp. 31-45
    • Varadharajan, V.1    Tupakula, U.2
  • 107
    • 84895138157 scopus 로고    scopus 로고
    • Cloud adoption issues: Interoperability and security
    • V. Vladimir, Cloud adoption issues: interoperability and security, in: Cloud Computing and Big Data, 2013, pp. 53-65.
    • (2013) Cloud Computing and Big Data , pp. 53-65
    • Vladimir, V.1
  • 108
    • 84863392301 scopus 로고    scopus 로고
    • HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • Z. Wan, J. Liu, and R.H. Deng HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing IEEE Trans. Inform. Forensics Sec. 7 2 2012 743 754
    • (2012) IEEE Trans. Inform. Forensics Sec. , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 110
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou Toward secure and dependable storage services in cloud computing IEEE Trans. Services Comput. 5 2 2012 220 232
    • (2012) IEEE Trans. Services Comput. , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 112
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer Berlin, Heidelberg
    • B. Waters Efficient identity-based encryption without random oracles Advances in Cryptology EUROCRYPT 2005 Springer Berlin, Heidelberg 114 127
    • (2005) Advances in Cryptology EUROCRYPT , pp. 114-127
    • Waters, B.1
  • 114
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A.V. Vasilakos Security and privacy for storage and computation in cloud computing Inform. Sci. 258 2014 371 386
    • (2014) Inform. Sci. , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 117
    • 84883723042 scopus 로고    scopus 로고
    • Design and implementation of cloud API access control based on OAuth
    • M.Y. Wu, T.H. Lee, Design and implementation of cloud API access control based on OAuth, in: IEEE TENCON Spring Conference, 2013, pp. 485-489.
    • (2013) IEEE TENCON Spring Conference , pp. 485-489
    • Wu, M.Y.1    Lee, T.H.2
  • 121
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • Z. Xiao, and Y. Xiao Security and privacy in cloud computing IEEE Commun. Surveys Tutorials 15 2 2013 843 859
    • (2013) IEEE Commun. Surveys Tutorials , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 123
    • 84901427258 scopus 로고    scopus 로고
    • A survey on trust management for Internet of things
    • Z. Yan, P. Zhang, and A.V. Vasilakos A survey on trust management for Internet of things J. Netw. Comput. Appl. 42 2014 120 134
    • (2014) J. Netw. Comput. Appl. , vol.42 , pp. 120-134
    • Yan, Z.1    Zhang, P.2    Vasilakos, A.V.3
  • 128
    • 84885310053 scopus 로고    scopus 로고
    • Security-preserving live migration of virtual machines in the cloud
    • F. Zhang, and H. Chen Security-preserving live migration of virtual machines in the cloud J. Netw. Syst. Manage. 21 4 2013 562 587
    • (2013) J. Netw. Syst. Manage. , vol.21 , Issue.4 , pp. 562-587
    • Zhang, F.1    Chen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.