Author:
Alofe Olasunkanmi Matthew,Fatema Kaniz
Abstract
AbstractTrustworthy cloud computing has been a central tenet of the European Union cloud strategy for nearly a decade. This chapter discusses the origins of trustworthy computing and specifically how the goals of trustworthy computing—security and privacy, reliability, and business integrity—are represented in computer science research. We call for further inter- and multi-disciplinary research on trustworthy cloud computing that reflect a more holistic view of trust.
Publisher
Springer International Publishing
Reference55 articles.
1. Abawajy, J. (2011). Establishing Trust in Hybrid Cloud Computing Environments. 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 118–125). IEEE.
2. Abdalla, A. K. A., & Pathan, A. S. K. (2014). On Protecting Data Storage in Mobile Cloud Computing Paradigm. IETE Technical Review, 31(1), 82–91.
3. Acar, A., Aksu, H., Uluagac, A. S., & Conti, M. (2018). A Survey on Homomorphic Encryption Schemes: Theory and Implementation. ACM Computing Surveys (CSUR), 51(4), 1–35.
4. Adams, M., Bearly, S., Bills, D., Foy, S., Li, M., Rains, T., Ray, M., Rogers, D., Simorjay, F., Suthers, S., & Wescott, J. (2014). An Introduction to Designing Reliable Cloud Services. Redmond, WA: Microsoft Corporation.
5. Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., & Zomaya, A. Y. (2015). SeDaSC: Secure Data Sharing in Clouds. IEEE Systems Journal, 11(2), 395–404.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献