Client Side Cloud Computing Security: a mixed Market Analysis

نویسندگان

  • Yipeng Liu
  • Xia Sheng
  • Sean R. Marston
چکیده

Could computing service providers have to ensure that the service applications, cloud software, and the physical location of the cloud are secure. Furthermore, providers need to ensure that the service is secure on the client’s side of the system. To examine the client side security level we build economic models that consider the tradeoffs between system usability and client side security restrictions. Our mixed market model is based on firms with different objectives (i.e., social welfare maximizing vs. profit maximizing). Under the mixed market model, we show that it is desirable to maintain adequate client side security differentiation. The equilibrium price charged by the welfare maximizing firm for its cloud computing service is always equal to that charged by the profit maximizing firm. The result shows that socially optimal solution is achieved when the welfare maximizing firm is the market leader.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Cloud Computing Implications to Digital Forensics a New Methodology Proposal

This paper deals with a novel approach to digital investigations, aimed at optimizing law enforcement’s tasks, concerning digital evidence acquisition, examination, analysis and reporting, and reducing investigation complexity and operational costs. In the face of Internet’s pervasiveness and massive market penetration of high-performing and low-cost handset devices, resulting in a worldwide di...

متن کامل

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage

To protect sensitive user data against server-side attacks, a number of security-conscious web applications have turned to client-side encryption, where only encrypted user data is ever stored in the cloud. We formally investigate the security of a number of such applications, including password managers, cloud storage providers, an e-voting website and a conference management system. We find t...

متن کامل

A Novel Method for VANET Improvement using Cloud Computing

In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014