DocumentCode
186646
Title
Trusting cloud computing for personal files
Author
Naser, Aws ; Zolkipli, Mohamad Fadli ; Majid, Mazlina A. ; Anwar, Sohel
Author_Institution
Fac. of Comput. Syst. & Software Eng., Univ. Malaysia Pahang, Kuantan, Malaysia
fYear
2014
fDate
22-24 Oct. 2014
Firstpage
488
Lastpage
489
Abstract
In a recent research study concerning current and future (state-of-the-art) cloud security issues, we recognised a substantive number of security loopholes in information technology systems and devised relevant solutions for such problems. As an outcome, exchanging the main point that contains all the information originating from heterogeneous sources that oversee the physiological methodologies of a city could have devastating effects because cloud security would be influenced at diverse levels and clients would be influenced at distinctive administrations. In addition, if these innovations are utilised more extensively, cyber terrorism could, with a solitary machine ambush, hinder significant number´s urban areas worldwide. This paper summarises some major issues in cloud computing, which caused us to reconsider the type of information that can be stored safely in cloud computing.
Keywords
cloud computing; trusted computing; cloud computing; cloud security; cyber terrorism could; information technology systems; personal files; solitary machine ambush; trusted computing; Cities and towns; Cloud computing; Computers; Security; Standards; Technological innovation; formatting; insert; style; styling;
fLanguage
English
Publisher
ieee
Conference_Titel
Information and Communication Technology Convergence (ICTC), 2014 International Conference on
Conference_Location
Busan
Type
conf
DOI
10.1109/ICTC.2014.6983188
Filename
6983188
Link To Document