원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.10 No.2
2016.02
pp.341-352
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
1.1. Problem Statement
1.2. Disadvantages of Cloud Computing
2 Privacy Issues for Cloud Computing
2.1. Potential Unauthorised Secondary Usage
2.2 Lack of User Control
2.3. Complexity of Regulatory Compliance
2.4. Lack of Training and Expertise
3. Security Issues for Cloud Computing
3.1. Backup Vulnerabilities
3.2. Gap in Security
3.3. Unwanted Access
3.4. Inadequate Data Deletion
4. Ubuntu Enterprise Cloud (UEC)
4.1. Case Study: Amazon's EC2 Infrastructure
5. Innovation Using Ubuntu Enterprises Cloud for Simulation
5.1. Methodology
5.2. Implementation and Results
6. Enhanced Algorithms
6.1. RSA-Public-Key Algorithm
7. Results of the Experiment
7.1. Key Generation
7.2. Encryption
7.3. Decryption
8. Conclusion
9. Future Research
References
1. Introduction
1.1. Problem Statement
1.2. Disadvantages of Cloud Computing
2 Privacy Issues for Cloud Computing
2.1. Potential Unauthorised Secondary Usage
2.2 Lack of User Control
2.3. Complexity of Regulatory Compliance
2.4. Lack of Training and Expertise
3. Security Issues for Cloud Computing
3.1. Backup Vulnerabilities
3.2. Gap in Security
3.3. Unwanted Access
3.4. Inadequate Data Deletion
4. Ubuntu Enterprise Cloud (UEC)
4.1. Case Study: Amazon's EC2 Infrastructure
5. Innovation Using Ubuntu Enterprises Cloud for Simulation
5.1. Methodology
5.2. Implementation and Results
6. Enhanced Algorithms
6.1. RSA-Public-Key Algorithm
7. Results of the Experiment
7.1. Key Generation
7.2. Encryption
7.3. Decryption
8. Conclusion
9. Future Research
References
저자정보
참고문헌
자료제공 : 네이버학술정보