901
Views
2
CrossRef citations to date
0
Altmetric
Research Article

Performance evaluation of multi-cloud compared to the single-cloud under varying firewall conditions

, ORCID Icon, & | (Reviewing editor)
Article: 1471974 | Received 20 Nov 2017, Accepted 30 Apr 2018, Published online: 26 Jun 2018

References

  • Armbrust, M. , Fox, A. , Griffith, R. , Joseph, A. D. , Katz, R. , Konwinski, A. , et al. (2010). A view of cloud computing. Communications of the ACM , 53(4), 50–58. doi:10.1145/1721654.1721672
  • Cloud Computing Use Case Discussion Group . (2010). Cloud computing use cases version 3.0 .
  • Cloud Security Alliance . (2010). Retrieved from http://www.cloudsecurityalliance.org/
  • ENISA (2009). Cloud computing: benefits, risks and recommendations for information Security . Retrieved from http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessment
  • Kandukuri, B. R. , Paturi, R. , & Rakshit, A. (2009). Cloud security issues. In Proceedings of the 2009 IEEE international conference on services computing (pp. 517–520).  Bangalore, India.
  • Li, H. , Li, H. , Wei, K. , Yin, S.-L. , & Zhao, C. (2017). A Multi-keyword search algorithm based on polynomial function and safety inner-product method in secure cloud environment. Journal of Information Hiding and Multimedia Signal Processing , 8(2), 413–422.
  • Mukherjee, M. , Matam, R. , Shu, L. , Maglaras, L. , Ferrag, M. A. , Choudhury, N., & Kumar, V. (2017). Security and privacy in fog computing: CHALLENGES. IEEE Access , 5, 19293–19304. doi:10.1109/ACCESS.2017.2749422
  • Popovic, K. , & Hocenski, Z. (2010, June). Cloud computing security issues and challenges . The Third International conference on advances in human oriented and personalized mechanisms, technologies, and services, pp. 344–349.
  • Salman, T. (2015). On securing multi-clouds: Survey on advances and current challenges. Semantic Scholar , 7, 1–16.
  • Tebaa, M. , & EL HAJJI, S. (2015, September). From single to multi-clouds computing privacy and fault tolerance . International Conference on Future Information Engineering, pp. 112–118. Elsevier B.V.
  • Vee, A. V. R. (2015). Usage of OPNET IT tool to simulate and test the security of cloud under varying firewall conditions, graduate project report (pp. 1–63). Texas A&M University Corpus Christi.
  • Vonnegut, S. (2017, October) IT-leadership: Cloud or clouds? How and why to choose a single or multi-cloud approach . Retrieved from https://www.stratoscale.com/blog/it-leadership/cloud-clouds-choose-single-multi-cloud-approach/
  • Wang, Y. (2016). The encryption scheme for DICOM based on the homomorphic higher degree residue system in cloud storage. Journal of Information Hiding and Multimedia Signal Processing , 7(2), 286–295.