Loading...
Please wait, while we are loading the content...
Similar Documents
Technology for Trusted Cloud Security: Survey and Open Issues
| Content Provider | Scilit |
|---|---|
| Author | Pietro, Roberto Di Lombardi, Flavio Signorini, Matteo |
| Copyright Year | 2020 |
| Description | Cloud computing (see Figure 25.1) provides many benefits to organizations (both providers and users) in terms of scalability, maintenance cost, and flexibility. Nevertheless, potential cloud service providers and users are still skeptical toward cloud computing adoption due 358to security and privacy concerns. Trusted execution technology is increasingly successful in heterogeneous fields aiming at securing the execution of code and access control to premium content, though some criticalities associated with such technologies start becoming apparent—as discussed in this chapter. Figure 25.1 Relevant cloud computing architectural components. (From Sam Johnston, Cloud computing. Wikimedia Foundation, San Francisco, CA, 2013. Used with permission.) [3] Book Name: Cloud Computing Security |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2018-0-94256-2&isbn=9780429055126&doi=10.1201/9780429055126-30&format=pdf |
| Ending Page | 372 |
| Page Count | 16 |
| Starting Page | 357 |
| DOI | 10.1201/9780429055126-30 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2020-11-09 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Cloud Computing Security Computation Theory and Mathematics Figure Cloud Computing Execution Technologies Survey Trusted Security Providers and Users |
| Content Type | Text |
| Resource Type | Chapter |