Abstract
Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.
Original language | American English |
---|---|
Article number | 8123460 |
Pages (from-to) | 61-67 |
Number of pages | 7 |
Journal | IEEE Security and Privacy |
Volume | 15 |
Issue number | 6 |
DOIs | |
State | Published - 1 Nov 2017 |
Keywords
- cloud computing
- security
- trusted proxy
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law