A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Efficient Auditing Protocol For Information Sharing And Secured Distributed Storage
2022
Zenodo
The record put away in the cloud can be shared and utilized by others dependingon the prerequisite that the touchy data of the document is ensured. ...
A character based information respectability reviewing plan for secure distributed storage, which bolsters information offering to delicate data covering up. ...
a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis AUTHOR: Ziad Ismail, Christophe Kiennert, Jean Leneutre, and Lin YEAR: 2014
SQL Server Management Studio is a ...
doi:10.5281/zenodo.7136919
fatcat:wrbndodalveqng6spsn6eisjte
PRIVATEER Deliverable D2.2: Use cases, requirements and design report
2023
Zenodo
This deliverable identifies use cases for privacy-preserving security in 5G/6G, lists the requirements and describes the architecture for the PRIVATEER security framework. ...
forensic analysis, compliance, and incident investigation purposes. ...
Thus, we should apply game-theoretic & deep reinforcement learning methodologies to solve this multi-input (multiconstraint) problem domain. ...
doi:10.5281/zenodo.10027073
fatcat:bvqza3tgqnevvdl7gqmvoq6ftu
Privacy and security issues in cloud computing: The role of institutions and institutional evolution
2013
Telecommunications Policy
A goal of the present work is also to gain insights into the mechanisms and forces that have brought about institutional changes in the cloud industry. ...
Since the current analysis of the causes and consequences of institutions and institutional change is mainly concerned with more established industries and markets, this paper is expected to provide insights ...
Analysts argue that auditing standards to assess a service provider's control over data (e.g., SAS 70) or other information security specifications (e.g., the International Organization for Standardization's ...
doi:10.1016/j.telpol.2012.04.011
fatcat:uqvktvq7wnh33mmpzam7fyjjla
Cloud computing security: protecting cloud-based smart city applications
2016
Journal of Smart Cities
Data security is a major concern in cloud computing environments as they provide much scope for intruders to attack. ...
provider auditing, secure APIs, transport layer protection, authentication and encryption key management, and cloud service agreements. ...
The best way to protect against such threats is via data backups for subsequent restore. (8) Data breach. ...
doi:10.18063/jsc.2016.01.007
fatcat:erows7o7gvbptnhpjtxeuqofce
Managing Electronic Records - Methods and Best Practices
[article]
2013
Zenodo
your company or a cloud provider) can result in the hiring of people with criminal records, granting them access to sensitive information. ■ A cloud provider's employee allows unauthorized access to data ...
compliance, supporting information governance (IG), and providing backup capabilities in the event of a disaster. ■ Compliance costs and requirements with limited staff. ...
A provider's offering of abstracted Internet services is often called The Cloud. ...
doi:10.5281/zenodo.5607736
fatcat:xkus3eiaoraj5jqhahlnrai5hu
Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage
2016
KSII Transactions on Internet and Information Systems
Mobile Cloud Computing has become a promising computing platform. It moves users' data to the centralized large data centers for users' mobile devices to conveniently access. ...
Theoretical analysis and experiment evaluation show that our algorithm not only shortens the verification finish time, but also decreases energy consumption, thus improving the efficiency and reliability ...
[12] adopted a game theoretical analysis to audit a cloud provider's compliance with data backup requirements. Li et al. ...
doi:10.3837/tiis.2017.01.001
fatcat:fg5hc3uosrefvdobaiwsdycmhu
The Cloud: Understanding the Security, Privacy and Trust Challenges
2010
Social Science Research Network
authors would like to acknowledge the support of Dr Lorenzo Valeri, who, following his new appointment at the School of Government in LUISS University in Rome in April 2010, maintained his engagement with ...
Although the technologies and legal or compliance requirements associated with the cloud may not be new or particularly innovative (for example, the audit requirements resemble those required for outsourcing ...
, new notifications may be required by data protection authorities, and auditing of the service provider's infrastructure to ensure appropriate security may become very problematic). • Infrastructure may ...
doi:10.2139/ssrn.2141970
fatcat:djodoaep2zaxdppfueavfx5cle
The Future of HIPAA in the Cloud
2013
Social Science Research Network
To meaningfully consent to new uses of protected health information, patients will need access to more sophisticated and granular methods of monitoring data collection, analysis, and use. ...
Nevertheless, more needs to be done to assure that health privacy and all the values it is meant to protect are actually vindicated in an era of ever faster and more pervasive data transfer and analysis ...
This analysis is important as cloud-based solutions become more widespread in the health care industry."); Attorney: HIPAA Rules Change Game for Cloud Companies, //www.healthdatamanagement.com/issues/21 ...
doi:10.2139/ssrn.2298158
fatcat:mhjwbfe7tfdvvnc3em2cv4aqqi
Prioritising Organisational Factors Impacting Cloud ERP Adoption and the Critical Issues Related to Security, Usability, and Vendors: A Systematic Literature Review
2021
Sensors
Therefore, the contribution of this research is to provide research and practice with the identification and analysis of 16 CSFs through a systematic literature review, where 73 publications on cloud ERP ...
Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor's cloud platform instead of an on-premises network, enabling companies to connect through the Internet. ...
to the vendor's reliability with regard to cloud-based ERP software applications. [40]
Data backup and recovery Relates to the extent to which a cloud ERP service can swiftly return to operating in ...
doi:10.3390/s21248391
pmid:34960483
pmcid:PMC8707710
fatcat:gvlle24s6ngknoevcbcdppqwtq
Edge Security: Challenges and Issues
[article]
2022
arXiv
pre-print
Edge computing is a paradigm that shifts data processing services to the network edge, where data are generated. ...
We further discuss privacy and regulatory compliance challenges in such networks. ...
Also, due to data replications and backups, incomplete data deletion processes might not erase the data in the cloud infrastructure completely.
C. ...
arXiv:2206.07164v1
fatcat:pulxs6p52zfhhkpuldcyauazhy
Towards a Consumer Cloud Computing Maturity Model - Proposition of Development Guidelines, Maturity Domains and Maturity Levels
2013
Pacific Asia Conference on Information Systems
In recent years, Cloud Computing (CC) has transformed from a new trend to IT management reality. ...
Through the execution of a maturity model development process, this contribution is aiming at deriving development guidelines for the future development of a holistic consumer CCMM. ...
TOWARDS A CLOUD COMPUTING MATURITY MODEL
Phase 1: Problem definition In compliance with requirements R5 and R6, the first phase urges the developer to show that there is indeed a need for a CCMM. ...
dblp:conf/pacis/WeissRZS13
fatcat:m5grs7s3zbffzcmy7lfip5vwxm
D3.1: Strategy analysis report and Cloud Computing
2021
Zenodo
In response to this, the paper summarises a supply and demand analysis conducted by the H-CLOUD project aiming at identifying the status, challenges, and opportunities that Europe is facing with regards ...
to the adoption and provision of cloud computing with a specific focus on federated cloud, edge computing, and green computing. ...
three domains is handled differently: • Each service provider's compliance with service management standards and procedures is assessed and monitored by the federating entity. • Compliance with technical ...
doi:10.5281/zenodo.5530740
fatcat:j56fkvlparegliqexa5p27ckge
A taxonomy of quality metrics for cloud services
2020
IEEE Access
The data extracted from the metrics were subsequently analyzed using thematic analysis. ...
A large number of metrics with which to assess the quality of cloud services have been proposed over the last years. ...
The provider's metrics can include metrics to ensure compliance with data protection regulations regarding keeping or deleting customer data. ...
doi:10.1109/access.2020.3009079
fatcat:hlvvfgaz2jhkbosb5fvkecvicy
D2.3_Cloud Services Procurement Roadmap For Public Research Organisations
2016
Zenodo
prepared to consider procuring cloud services on a significant scale. ...
Computing in the cloud is providing new efficiencies in a wide range of sectors. ...
Compliance with public records laws and legal data holds is also a core part of cloud contracts. ...
doi:10.5281/zenodo.49744
fatcat:xdmxtq35lnd6bmincn6hx32xo4
Consumer Privacy Choices, Informed Consent, and Baseline Protections to Facilitate Market Transactions in the Cloud
2012
Social Science Research Network
Virtually every time that we plug into a new service, the service requires us to click the seemingly ubiquitous box indicating that we have read and agreed to the provider's terms of service (TOS) and ...
provider's obligations to the user. ...
Some gaming services are appearing in the cloud, like OnLive and Gaikai, and some posit that the cloud has the potential to let gamers play games with high-end graphics without having high-end computers ...
doi:10.2139/ssrn.2042638
fatcat:2i2bqo6r2be63ltmqvkeyp7tyq
« Previous
Showing results 1 — 15 out of 103 results