Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








103 Hits in 7.4 sec

An Efficient Auditing Protocol For Information Sharing And Secured Distributed Storage

Samuel Solomon
2022 Zenodo  
The record put away in the cloud can be shared and utilized by others dependingon the prerequisite that the touchy data of the document is ensured.  ...  A character based information respectability reviewing plan for secure distributed storage, which bolsters information offering to delicate data covering up.  ...  a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis AUTHOR: Ziad Ismail, Christophe Kiennert, Jean Leneutre, and Lin YEAR: 2014 SQL Server Management Studio is a  ... 
doi:10.5281/zenodo.7136919 fatcat:wrbndodalveqng6spsn6eisjte

PRIVATEER Deliverable D2.2: Use cases, requirements and design report

Antonio Pastor, Hugo Ramon, Diego Lopez
2023 Zenodo  
This deliverable identifies use cases for privacy-preserving security in 5G/6G, lists the requirements and describes the architecture for the PRIVATEER security framework.  ...  forensic analysis, compliance, and incident investigation purposes.  ...  Thus, we should apply game-theoretic & deep reinforcement learning methodologies to solve this multi-input (multiconstraint) problem domain.  ... 
doi:10.5281/zenodo.10027073 fatcat:bvqza3tgqnevvdl7gqmvoq6ftu

Privacy and security issues in cloud computing: The role of institutions and institutional evolution

Nir Kshetri
2013 Telecommunications Policy  
A goal of the present work is also to gain insights into the mechanisms and forces that have brought about institutional changes in the cloud industry.  ...  Since the current analysis of the causes and consequences of institutions and institutional change is mainly concerned with more established industries and markets, this paper is expected to provide insights  ...  Analysts argue that auditing standards to assess a service provider's control over data (e.g., SAS 70) or other information security specifications (e.g., the International Organization for Standardization's  ... 
doi:10.1016/j.telpol.2012.04.011 fatcat:uqvktvq7wnh33mmpzam7fyjjla

Cloud computing security: protecting cloud-based smart city applications

Alkiviadis Giannakoulias
2016 Journal of Smart Cities  
Data security is a major concern in cloud computing environments as they provide much scope for intruders to attack.  ...  provider auditing, secure APIs, transport layer protection, authentication and encryption key management, and cloud service agreements.  ...  The best way to protect against such threats is via data backups for subsequent restore. (8) Data breach.  ... 
doi:10.18063/jsc.2016.01.007 fatcat:erows7o7gvbptnhpjtxeuqofce

Managing Electronic Records - Methods and Best Practices [article]

Robert F. Smallwood
2013 Zenodo  
your company or a cloud provider) can result in the hiring of people with criminal records, granting them access to sensitive information. ■ A cloud provider's employee allows unauthorized access to data  ...  compliance, supporting information governance (IG), and providing backup capabilities in the event of a disaster. ■ Compliance costs and requirements with limited staff.  ...  A provider's offering of abstracted Internet services is often called The Cloud.  ... 
doi:10.5281/zenodo.5607736 fatcat:xkus3eiaoraj5jqhahlnrai5hu

Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage

2016 KSII Transactions on Internet and Information Systems  
Mobile Cloud Computing has become a promising computing platform. It moves users' data to the centralized large data centers for users' mobile devices to conveniently access.  ...  Theoretical analysis and experiment evaluation show that our algorithm not only shortens the verification finish time, but also decreases energy consumption, thus improving the efficiency and reliability  ...  [12] adopted a game theoretical analysis to audit a cloud provider's compliance with data backup requirements. Li et al.  ... 
doi:10.3837/tiis.2017.01.001 fatcat:fg5hc3uosrefvdobaiwsdycmhu

The Cloud: Understanding the Security, Privacy and Trust Challenges

Neil Robinson, Lorenzo Valeri, Jonathan Cave, Tony Starkey, Hans Graux, Sadie Creese, Paul P. Hopkins
2010 Social Science Research Network  
authors would like to acknowledge the support of Dr Lorenzo Valeri, who, following his new appointment at the School of Government in LUISS University in Rome in April 2010, maintained his engagement with  ...  Although the technologies and legal or compliance requirements associated with the cloud may not be new or particularly innovative (for example, the audit requirements resemble those required for outsourcing  ...  , new notifications may be required by data protection authorities, and auditing of the service provider's infrastructure to ensure appropriate security may become very problematic). • Infrastructure may  ... 
doi:10.2139/ssrn.2141970 fatcat:djodoaep2zaxdppfueavfx5cle

The Future of HIPAA in the Cloud

Frank A. Pasquale, Tara Adams Ragone
2013 Social Science Research Network  
To meaningfully consent to new uses of protected health information, patients will need access to more sophisticated and granular methods of monitoring data collection, analysis, and use.  ...  Nevertheless, more needs to be done to assure that health privacy and all the values it is meant to protect are actually vindicated in an era of ever faster and more pervasive data transfer and analysis  ...  This analysis is important as cloud-based solutions become more widespread in the health care industry."); Attorney: HIPAA Rules Change Game for Cloud Companies, //www.healthdatamanagement.com/issues/21  ... 
doi:10.2139/ssrn.2298158 fatcat:mhjwbfe7tfdvvnc3em2cv4aqqi

Prioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review

Sayeed Salih, Mosab Hamdan, Abdelzahir Abdelmaboud, Ahmed Abdelaziz, Samah Abdelsalam, Maha M. Althobaiti, Omar Cheikhrouhou, Habib Hamam, Faiz Alotaibi
2021 Sensors  
Therefore, the contribution of this research is to provide research and practice with the identification and analysis of 16 CSFs through a systematic literature review, where 73 publications on cloud ERP  ...  Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor's cloud platform instead of an on-premises network, enabling companies to connect through the Internet.  ...  to the vendor's reliability with regard to cloud-based ERP software applications. [40] Data backup and recovery Relates to the extent to which a cloud ERP service can swiftly return to operating in  ... 
doi:10.3390/s21248391 pmid:34960483 pmcid:PMC8707710 fatcat:gvlle24s6ngknoevcbcdppqwtq

Edge Security: Challenges and Issues [article]

Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Ashish Kundu, Ramana Kompella
2022 arXiv   pre-print
Edge computing is a paradigm that shifts data processing services to the network edge, where data are generated.  ...  We further discuss privacy and regulatory compliance challenges in such networks.  ...  Also, due to data replications and backups, incomplete data deletion processes might not erase the data in the cloud infrastructure completely. C.  ... 
arXiv:2206.07164v1 fatcat:pulxs6p52zfhhkpuldcyauazhy

Towards a Consumer Cloud Computing Maturity Model - Proposition of Development Guidelines, Maturity Domains and Maturity Levels

Daniel Weiss, Jonas Repschlaeger, Rüdiger Zarnekow, Holger Schrödl
2013 Pacific Asia Conference on Information Systems  
In recent years, Cloud Computing (CC) has transformed from a new trend to IT management reality.  ...  Through the execution of a maturity model development process, this contribution is aiming at deriving development guidelines for the future development of a holistic consumer CCMM.  ...  TOWARDS A CLOUD COMPUTING MATURITY MODEL Phase 1: Problem definition In compliance with requirements R5 and R6, the first phase urges the developer to show that there is indeed a need for a CCMM.  ... 
dblp:conf/pacis/WeissRZS13 fatcat:m5grs7s3zbffzcmy7lfip5vwxm

D3.1: Strategy analysis report and Cloud Computing

Dietrich Mark, Federico Facca
2021 Zenodo  
In response to this, the paper summarises a supply and demand analysis conducted by the H-CLOUD project aiming at identifying the status, challenges, and opportunities that Europe is facing with regards  ...  to the adoption and provision of cloud computing with a specific focus on federated cloud, edge computing, and green computing.  ...  three domains is handled differently: • Each service provider's compliance with service management standards and procedures is assessed and monitored by the federating entity. • Compliance with technical  ... 
doi:10.5281/zenodo.5530740 fatcat:j56fkvlparegliqexa5p27ckge

A taxonomy of quality metrics for cloud services

Ximena Guerron, Silvia Abrahao, Emilio Insfran, Marta Fernandez-Diego, Fernando Gonzalez-Ladron-De-Guevara
2020 IEEE Access  
The data extracted from the metrics were subsequently analyzed using thematic analysis.  ...  A large number of metrics with which to assess the quality of cloud services have been proposed over the last years.  ...  The provider's metrics can include metrics to ensure compliance with data protection regulations regarding keeping or deleting customer data.  ... 
doi:10.1109/access.2020.3009079 fatcat:hlvvfgaz2jhkbosb5fvkecvicy

D2.3_Cloud Services Procurement Roadmap For Public Research Organisations

Sara Garavelli, Robert Jones, Rachida Amsaghrou
2016 Zenodo  
prepared to consider procuring cloud services on a significant scale.  ...  Computing in the cloud is providing new efficiencies in a wide range of sectors.  ...  Compliance with public records laws and legal data holds is also a core part of cloud contracts.  ... 
doi:10.5281/zenodo.49744 fatcat:xdmxtq35lnd6bmincn6hx32xo4

Consumer Privacy Choices, Informed Consent, and Baseline Protections to Facilitate Market Transactions in the Cloud

Jay P. Kesan, Carol M. Hayes, Masooda Bashir
2012 Social Science Research Network  
Virtually every time that we plug into a new service, the service requires us to click the seemingly ubiquitous box indicating that we have read and agreed to the provider's terms of service (TOS) and  ...  provider's obligations to the user.  ...  Some gaming services are appearing in the cloud, like OnLive and Gaikai, and some posit that the cloud has the potential to let gamers play games with high-end graphics without having high-end computers  ... 
doi:10.2139/ssrn.2042638 fatcat:2i2bqo6r2be63ltmqvkeyp7tyq
« Previous Showing results 1 — 15 out of 103 results