From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

Formal reasoning about the security of amazon web services

B Cook - … Aided Verification: 30th International Conference, CAV …, 2018 - Springer
We report on the development and use of formal verification tools within Amazon Web
Services (AWS) to increase the security assurance of its cloud infrastructure and to help …

Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment

M Saleem, MR Warsi, S Islam - Journal of Information Security and …, 2023 - Elsevier
Trust is an essential security component and plays a crucial role in building secure
information processing systems. Many organizations have adopted zero-trust principles in …

SLA guarantees for cloud services

D Serrano, S Bouchenak, Y Kouki… - Future Generation …, 2016 - Elsevier
Quality-of-service and SLA guarantees are among the major challenges of cloud-based
services. In this paper we first present a new cloud model called SLAaaS—SLA aware …

A survey on cloud forensics challenges and solutions

S Simou, C Kalloniatis, S Gritzalis… - Security and …, 2016 - Wiley Online Library
In recent years, cloud computing has gained popularity, and it is now used to support
various areas of human life. Cloud forensics has been introduced to help forensic …

A review study on cloud computing issues

QK Kadhim, R Yusof, HS Mahdi… - Journal of Physics …, 2018 - iopscience.iop.org
Cloud computing is the most promising current implementation of utility computing in the
business world, because it provides some key features over classic utility computing, such …

[图书][B] Large scale and big data: Processing and management

S Sakr, M Gaber - 2014 - books.google.com
Large Scale and Big Data: Processing and Management provides readers with a central
source of reference on the data management techniques currently available for large-scale …

Bootstrapping and maintaining trust in the cloud

N Schear, PT Cable, TM Moyer, B Richard… - Proceedings of the 32nd …, 2016 - dl.acm.org
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the
provider to secure applications and data. Cloud providers do not offer the ability to create …

A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments

M Kazim, L Liu, SY Zhu - IEEE Access, 2018 - ieeexplore.ieee.org
IoT devices have complex requirements but their limitations in terms of storage, network,
computing, data analytics, scalability, and big data management require it to be used it with …