DocumentCode :
186646
Title :
Trusting cloud computing for personal files
Author :
Naser, Aws ; Zolkipli, Mohamad Fadli ; Majid, Mazlina A. ; Anwar, Sohel
Author_Institution :
Fac. of Comput. Syst. & Software Eng., Univ. Malaysia Pahang, Kuantan, Malaysia
fYear :
2014
fDate :
22-24 Oct. 2014
Firstpage :
488
Lastpage :
489
Abstract :
In a recent research study concerning current and future (state-of-the-art) cloud security issues, we recognised a substantive number of security loopholes in information technology systems and devised relevant solutions for such problems. As an outcome, exchanging the main point that contains all the information originating from heterogeneous sources that oversee the physiological methodologies of a city could have devastating effects because cloud security would be influenced at diverse levels and clients would be influenced at distinctive administrations. In addition, if these innovations are utilised more extensively, cyber terrorism could, with a solitary machine ambush, hinder significant number´s urban areas worldwide. This paper summarises some major issues in cloud computing, which caused us to reconsider the type of information that can be stored safely in cloud computing.
Keywords :
cloud computing; trusted computing; cloud computing; cloud security; cyber terrorism could; information technology systems; personal files; solitary machine ambush; trusted computing; Cities and towns; Cloud computing; Computers; Security; Standards; Technological innovation; formatting; insert; style; styling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technology Convergence (ICTC), 2014 International Conference on
Conference_Location :
Busan
Type :
conf
DOI :
10.1109/ICTC.2014.6983188
Filename :
6983188
Link To Document :
بازگشت