Traditional frameworks for risk assessment do not work well for cloud computing. While recent work has often focussed on the risks faced by firms adopting or selecting cloud …
A Gholami, E Laure - arXiv preprint arXiv:1601.01498, 2016 - arxiv.org
Cloud computing is revolutionizing many ecosystems by providing organizations with computing resources featuring easy deployment, connectivity, configuration, automation and …
The Internet of Things (IoT) and edge computing are starting to go hand in hand. By providing cloud services close to end-users, edge paradigms enhance the functionality of …
B Tierney, E Kissel, M Swany… - 2012 IEEE 8th …, 2012 - ieeexplore.ieee.org
Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over …
Cloud Computing raises various security and privacy challenges due to the customers' inherent lack of control over their outsourced data. One approach to encourage customers to …
A joint trust and risk model is introduced for federated cloud services. The model is based on cloud service providers' performance history. It addresses provider and consumer concerns …
H Cheng, C Rong, M Qian, W Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Considering the openness and cross-domains of cloud computing, the traditional privacy- preserving technology cannot be applied in cloud computing efficiently. In this paper …
Transparency is a basic privacy principle and factor of social trust. However, the processing of personal data along a cloud chain is often rather intransparent to the data subjects …
This article focuses on the role of accountability within information management, particularly in cloud computing contexts. Key to this notion is that an accountable Cloud Provider must …