Dergi makalesi Açık Erişim

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

Kiraz, Mehmet Sabir


MARC21 XML

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <controlfield tag="001">98935</controlfield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="a">Creative Commons Attribution</subfield>
    <subfield code="u">http://www.opendefinition.org/licenses/cc-by</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="v">7</subfield>
    <subfield code="p">JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING</subfield>
    <subfield code="n">5</subfield>
    <subfield code="c">731-760</subfield>
  </datafield>
  <controlfield tag="005">20210316140452.0</controlfield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today's real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">user-tubitak-adresli-yayinlar</subfield>
    <subfield code="o">oai:zenodo.org:98935</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">TUBITAK BILGEM, Math &amp; Computat Sci Labs, Gebze, Turkey</subfield>
    <subfield code="a">Kiraz, Mehmet Sabir</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-tubitak-adresli-yayinlar</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="z">md5:05c0779fed6c705a337983cee28cd386</subfield>
    <subfield code="s">177</subfield>
    <subfield code="u">https://aperta.ulakbim.gov.trrecord/98935/files/bib-e4f228f5-25a4-4a0e-914f-46427822cb3a.txt</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="2">doi</subfield>
    <subfield code="a">10.1007/s12652-016-0385-0</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2016-01-01</subfield>
  </datafield>
</record>
10
3
görüntülenme
indirilme
Görüntülenme 10
İndirme 3
Veri hacmi 531 Bytes
Tekil görüntülenme 10
Tekil indirme 3

Alıntı yap