Mitigating Disaster using Secure Threshold-Cloud Architecture
نویسندگان
چکیده
منابع مشابه
Secure Cloud Architecture
Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, se...
متن کاملA New Secure Mobile Cloud Architecture
The demand and use of mobile phones, PDAs and smart phones are constantly on the rise as such, manufacturers of these devices are improving the technology and usability of these devices constantly. Due to the handy shape and size these devices come in, their processing capabilities and functionalities, they are preferred by many over the conventional desktop or laptop computers. Mobile devices ...
متن کاملMitigating Disaster Losses through Insurance
Losses from natural disasters have increased in recent years due to growth of population in hazard-prone areas and inadequate enforcement of building codes. This article first examines why homeowners have not voluntarily adopted cost-effective protective measures and have limited interest in purchasing insurance. It then proposes a disaster-management program which utilizes insurance coupled wi...
متن کاملProviding a Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-encryption Scheme
Cloud computing treats the resources on the Internet as a unified entity, cloud. A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers. Storing data in a third party’s cloud system causes serious concern on data confidentiality. In order to provide strong confidentiality for messages in storage servers, a user can encr...
متن کاملMitigating Denial Of Services Using Secure Overlay Service Model
Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attack to be launched before taking appropriate measures to protect the network. This leaves the door open for other attacks that use more sophisticated methods to m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Current Trends in Computer Sciences & Applications
سال: 2018
ISSN: 2643-6744
DOI: 10.32474/ctcsa.2018.01.000107