Abstract
Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.
Original language | English |
---|---|
Article number | 8123460 |
Pages (from-to) | 61-67 |
Number of pages | 7 |
Journal | IEEE Security and Privacy |
Volume | 15 |
Issue number | 6 |
DOIs | |
State | Published - 1 Nov 2017 |
Bibliographical note
Publisher Copyright:© 2003-2012 IEEE.
Keywords
- cloud computing
- security
- trusted proxy
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law