Security issues in cloud computing
Cloud computing provides the ability to utilize scalable, distributed computing environments via the Internet. Over the years, cloud computing has grown from being a promising business concept to a fast growing sector in IT organizations. It has emerged as a promising hosting platform that allows an...
Saved in:
Published in | 2012 5th International Conference on Biomedical Engineering and Informatics pp. 1321 - 1325 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Cloud computing provides the ability to utilize scalable, distributed computing environments via the Internet. Over the years, cloud computing has grown from being a promising business concept to a fast growing sector in IT organizations. It has emerged as a promising hosting platform that allows an intelligent usage of a collection of applications, information and infrastructure comprised of pools of computer, network and storage resources. However, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the key factor which hampers growth of cloud computing. Some of the fundamental security challenges are data storage security, data transmission security, application security and security related to third-part resources. This paper focuses on security issues arising from the usage of cloud services. |
---|---|
AbstractList | Cloud computing provides the ability to utilize scalable, distributed computing environments via the Internet. Over the years, cloud computing has grown from being a promising business concept to a fast growing sector in IT organizations. It has emerged as a promising hosting platform that allows an intelligent usage of a collection of applications, information and infrastructure comprised of pools of computer, network and storage resources. However, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the key factor which hampers growth of cloud computing. Some of the fundamental security challenges are data storage security, data transmission security, application security and security related to third-part resources. This paper focuses on security issues arising from the usage of cloud services. |
Author | Meetei, Mutum Zico Goel, Anita |
Author_xml | – sequence: 1 givenname: Mutum Zico surname: Meetei fullname: Meetei, Mutum Zico organization: Dept. of Math., Jazan Univ., Jazan, Saudi Arabia – sequence: 2 givenname: Anita surname: Goel fullname: Goel, Anita organization: Dept. of Comput. Sci., Univ. of Delhi, New Delhi, India |
BookMark | eNo1j8FOwzAQRI0ACVryAYhLxD1h1-s48RGqApVa9UDvVeyskVGbVHFy6N8TiXIazeE9zczETdu1LMQjQo4I5uVts1zlElDmukACWV2JGSpdEmKlymuRmLL67wR3IonxBwAmVk_4vXj-Yjf2YTinIcaRYxra1B26sUlddzyNQ2i_H8Strw-Rk0vOxe59uVt8Zuvtx2rxus6CgSEjC86zJU9ETYFKekQDliV41Vhp2RpS5FD6wk1rWNbgKmwM1BK01J7m4ulPG5h5f-rDse7P-8sr-gWdckDH |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/BMEI.2012.6513028 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1467311847 1467311820 9781467311847 9781467311823 |
EndPage | 1325 |
ExternalDocumentID | 6513028 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-3b0cfeb3f333d5142f1190be20f4db2beb9343c12f5c731e2a0c81d90a20626f3 |
IEDL.DBID | RIE |
ISBN | 9781467311830 1467311839 |
IngestDate | Wed Aug 27 04:32:59 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-3b0cfeb3f333d5142f1190be20f4db2beb9343c12f5c731e2a0c81d90a20626f3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_6513028 |
PublicationCentury | 2000 |
PublicationDate | 2012-Oct. |
PublicationDateYYYYMMDD | 2012-10-01 |
PublicationDate_xml | – month: 10 year: 2012 text: 2012-Oct. |
PublicationDecade | 2010 |
PublicationTitle | 2012 5th International Conference on Biomedical Engineering and Informatics |
PublicationTitleAbbrev | BMEI |
PublicationYear | 2012 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001106109 |
Score | 1.586375 |
Snippet | Cloud computing provides the ability to utilize scalable, distributed computing environments via the Internet. Over the years, cloud computing has grown from... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1321 |
SubjectTerms | Cloud Assessment Cloud Computing Security |
Title | Security issues in cloud computing |
URI | https://ieeexplore.ieee.org/document/6513028 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwED62Pfmksom_KeKj7dKkqe2rsjGFieCEvY0kvcBQOnHti3-9l7TbUHzwrSkhJFfod5f77j6Aay6tIkdVh9ZRaBKlVJgZp-aO3HmvxmpPopk-pZPX5HEu5x242dbCIKInn2HkHn0uv1iZ2l2VDVPp0mxZF7oUuDW1Wrv7FBfbsNzXbqW3InbIv2np1I43WU2aNrybjh4csYtH7aI_1FU8uIz3YbrZVsMpeYvqSkfm61fHxv_u-wAGuzK-4HkLUIfQwbIPVy-tYl3gTb4OlmVg3ld1ERgv8EAzBzAbj2b3k7AVSgiXOatCoZmxFBRbIURBDhC3McG8Rs5sUmiuUeciESbmVhqyBHLFDLmpOVOcUTxjxRH0ylWJxxCQx2BShTZOZJHQv0dJo5ApnXLMpI3zE-i74y0-mlYYi_Zkp3-_PoM9Z-KG-3YOveqzxgvC8Epf-o_3DfGblq0 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH7MedCTyib-tohH26VJU9ursrHpOgQn7DaS9AWG0om2F_96k7TbUDx4a0oIySv0ey_ve-8DuKZcC-OoSl9bCk0khPATZdXckVrvVWnpSDTZJB6-RA8zPmvBzboWBhEd-QwD--hy-flSVfaqrBdzm2ZLtmDb4D4P62qtzY2KjW5I6qq34lsWWuxfNXVqxqu8ppnWu8v6I0vtokGz7A99FQcvgz3IVhurWSWvQVXKQH396tn4353vQ3dTyOc9rSHqAFpYdODqudGs85zRP71F4am3ZZV7ykk8mJldmA760_uh30gl-IuUlD6TRGkTFmvGWG5cIKpDA_QSKdFRLqlEmbKIqZBqrowlkAqijKOaEkGJiWg0O4R2sSzwCDzjM6hYoA4jnkfm7yO4EkiEjCkmXIfpMXTs8ebvdTOMeXOyk79fX8LOcJqN5-PR5PEUdq25aybcGbTLjwrPDaKX8sJ9yG8JNZn2 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+5th+International+Conference+on+Biomedical+Engineering+and+Informatics&rft.atitle=Security+issues+in+cloud+computing&rft.au=Meetei%2C+Mutum+Zico&rft.au=Goel%2C+Anita&rft.date=2012-10-01&rft.pub=IEEE&rft.isbn=9781467311830&rft.spage=1321&rft.epage=1325&rft_id=info:doi/10.1109%2FBMEI.2012.6513028&rft.externalDocID=6513028 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311830/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311830/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467311830/sc.gif&client=summon&freeimage=true |