Conference paper

Security Prospects through Cloud Computing by Adopting Multiple Clouds


Authors listJensen, M.; Schwenk, J.; Bohli, J.-M.; Gruschka, N.; Lo Iacono, L.

Appeared in2011 IEEE International Conference on Cloud Computing (CLOUD 2011)

Editor listLiu, L.

Publication year2011

Pages565-572

ISBN978-1-4577-0836-7

eISBN978-0-7695-4460-1

DOI Linkhttps://doi.org/10.1109/CLOUD.2011.85

Conference4th IEEE International Conference on Cloud Computing (CLOUD 2011)


Abstract

Clouds impose new security challenges, which are amongst the biggest obstacles when considering the usage of cloud services. This triggered a lot of research activities in this direction, resulting in a quantity of proposals targeting the various security threats. Besides the security issues coming with the cloud paradigm, it can also provide a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper initiates this discussion by contributing a concept which achieves security merits by making use of multiple distinct clouds at the same time.




Citation Styles

Harvard Citation styleJensen, M., Schwenk, J., Bohli, J., Gruschka, N. and Lo Iacono, L. (2011) Security Prospects through Cloud Computing by Adopting Multiple Clouds, in Liu, L. (ed.) 2011 IEEE International Conference on Cloud Computing (CLOUD 2011). Piscataway, NJ: IEEE. pp. 565-572. https://doi.org/10.1109/CLOUD.2011.85

APA Citation styleJensen, M., Schwenk, J., Bohli, J., Gruschka, N., & Lo Iacono, L. (2011). Security Prospects through Cloud Computing by Adopting Multiple Clouds. In Liu, L. (Ed.), 2011 IEEE International Conference on Cloud Computing (CLOUD 2011). (pp. 565-572). IEEE. https://doi.org/10.1109/CLOUD.2011.85


Last updated on 2025-13-08 at 09:06