To see the other types of publications on this topic, follow the link: SECURE CLOUD SYSTEMS.

Dissertations / Theses on the topic 'SECURE CLOUD SYSTEMS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 dissertations / theses for your research on the topic 'SECURE CLOUD SYSTEMS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lim, Jun Ming Kelvin. "Multi-level secure information sharing between smart cloud systems of systems." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41410.

Full text
Abstract:
Approved for public release; distribution is unlimited.<br>Reissued 1 Jul 2014 with corrections to in-text Figure and Table citations.<br>There is a need to have secure information sharing in the industry and government sectors. For example, countries within the North Atlantic Treaty Organization (NATO) often have a common goal requiring them to communicate, but they lack a technological platform for fast information sharing, especially if the countries have different access rights to the information. Thus, the same information that an organization wants to share with multiple partners needs t
APA, Harvard, Vancouver, ISO, and other styles
2

Gai, Keke. "An Approach for Designing Secure and High Performance Cloud Systems." Thesis, Pace University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10635446.

Full text
Abstract:
<p> Recent expansions of cloud computing have been growing at a phenomenal rate. Security and privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. However, there exists a contradiction between ensuring a high performance and achieving a high-level security and privacy protection due to the restrictions of the computing resources, based on the findings of the literature review. This study focuses on this contradiction issue and intend to develop an approach of effectuating the cloud system design for a high-level se
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Yuzhe. "Secure and high-performance big-data systems in the cloud." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53995.

Full text
Abstract:
Cloud computing and big data technology continue to revolutionize how computing and data analysis are delivered today and in the future. To store and process the fast-changing big data, various scalable systems (e.g. key-value stores and MapReduce) have recently emerged in industry. However, there is a huge gap between what these open-source software systems can offer and what the real-world applications demand. First, scalable key-value stores are designed for simple data access methods, which limit their use in advanced database applications. Second, existing systems in the cloud need automa
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.

Full text
Abstract:
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. One of the earliest secure MPC primitives is the Shamir's secret sharing (SSS) scheme. SSS has many advantages over other popular secure MPC primitives like garbled circuits (GC) -- it provides information-theoretic security guarantee, requires no complex long-integer operations, and often leads to more efficient protocols. Nonetheless, SSS receives less attention in the signal processing community because SSS requires a larger number of honest participan
APA, Harvard, Vancouver, ISO, and other styles
5

Harmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.

Full text
Abstract:
Cloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secure access methods to protect data on the cloud infrastructure. The population for this study was cloud security managers employed by 2 medium size businesses in the Atlanta, Georgia metropolitan area and that have strategies to implement secure access methods
APA, Harvard, Vancouver, ISO, and other styles
6

Goméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.

Full text
Abstract:
Email is a well established technology used worldwide for enterprise and private communication through the Internet. It allows people to communicate using text, but also other information formats used either as HTML or attached files. The communication is performed without the need of synchronized endpoints, based on the use of email servers that take care of storing and forwarding email letters. All these properties and much more standardized ones do not include security, which makes the choice of service provider hard when the letters sent in the email system include sensitive information. I
APA, Harvard, Vancouver, ISO, and other styles
7

Wiss, Thomas. "Evaluation of Internet of Things Communication Protocols Adapted for Secure Transmission in Fog Computing Environments." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35298.

Full text
Abstract:
A current challenge in the Internet of Things is the seeking after conceptual structures to connect the presumably billions of devices of innumerable forms and capabilities. An emerging architectural concept, the fog cloud computing, moves the seemingly unlimited computational power of the distant cloud to the edge of the network, closer to the potentially computationally limited things, effectively diminishing the experienced latency. To allow computationally-constrained devices partaking in the network they have to be relieved from the burden of constant availability and extensive computatio
APA, Harvard, Vancouver, ISO, and other styles
8

Kathirvel, Anitha, and Siddharth Madan. "Efficient Privacy Preserving Key Management for Public Cloud Networks." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048.

Full text
Abstract:
Most applications and documents are stored in a public cloud for storage and management purposes in a cloud computing environment. The major advantages of storing applications and documents in public cloud are lower cost through use of shared computing resources and no upfront infrastructure costs. However, in this case the management of data and other services is insecure. Therefore, security is a major problem in a public cloud as the cloud and the network are open to many other users. In order to provide security, it is necessary for data owners to store their data in the public cloud in a
APA, Harvard, Vancouver, ISO, and other styles
9

Pokherl, Bibesh. "Secure Web System in a Cloud Environment." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-117352.

Full text
Abstract:
Advent of cloud computing has brought a lot of benefits for users based on its essential characteristics. Users are attracted by its costs per use service and rapidly deploy their applications in the cloud and scale by using virtualization technology without investing in their own IT infrastructure. These applications can be accessed through web based technology, such as web browsers or mobile apps. However, security becomes a major challenge when user’s data and applications are stored in a remote server in a virtualized environment and Internet is medium for accessing them. Internet is alway
APA, Harvard, Vancouver, ISO, and other styles
10

Abolafya, Natan. "Secure Documents Sharing System for Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121297.

Full text
Abstract:
With the current trend of cloud services available in every market area in IT business, it is somewhat surprising that security services are not migrated to the cloud widely. Security as a Service (SECaaS) model is hardly popular at the moment even though the infrastructure of the cloud, or web, can support most of the functionalities of conventional distributed security services. Another uncommon phenomenon in the cloud is sharing secure files with multi-tenant support. This kind of service would be best available integrated with a SECaaS platform that may offer more similar application servi
APA, Harvard, Vancouver, ISO, and other styles
11

Sahli, Nabil. "Contribution au problème de la sécurité sémantique des systèmes : approche basée sur l'ingénierie dirigée par les modèles." Electronic Thesis or Diss., Aix-Marseille, 2019. http://www.theses.fr/2019AIXM0699.

Full text
Abstract:
Les infrastructures industrielles critiques seront dotées de plusieurs équipements embarqués intelligents. Elles exploitent des systèmes complexes, embarqués, intelligents et sémantiques pour leurs fonctionnements, en local et à distance, dans un contexte de développement, de villes intelligentes et du web des objets. Elles emploient, de plus en plus de systèmes «contrôle/commande», pour la surveillance des plateformes industrielles critiques, en temps réel. Les infrastructures critiques seront de plus en plus communicantes dans le cadre des échanges des alarmes et la mise en place de marchés
APA, Harvard, Vancouver, ISO, and other styles
12

Ladjel, Riad. "Secure distributed computations for the personal cloud." Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG043.

Full text
Abstract:
Grâce aux “smart disclosure initiatives”, traduit en français par « ouvertures intelligentes » et aux nouvelles réglementations comme le RGPD, les individus ont la possibilité de reprendre le contrôle sur leurs données en les stockant localement de manière décentralisée. En parallèle, les solutions dites de clouds personnels ou « système personnel de gestion de données » se multiplient, leur objectif étant de permettre aux utilisateurs d'exploiter leurs données personnelles pour leur propre bien.Cette gestion décentralisée des données personnelles offre une protection naturelle contre les atta
APA, Harvard, Vancouver, ISO, and other styles
13

Rostrom, Timothy James. "Framework to Secure Cloud-based Medical Image Storage and Management System Communications." BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/3124.

Full text
Abstract:
Picture Archiving and Communication Systems (PACS) have been traditionally constrained to the premises of the healthcare provider. This has limited the availability of these systems in many parts of the world and mandated major costs in infrastructure for those who employ them. Public cloud services could be a solution that eases the cost of ownership and provides greater flexibility for PACS implementations. This could make it possible to bring medical imaging services to places where it was previously unavailable and reduce the costs associated with these services for those who utilize them.
APA, Harvard, Vancouver, ISO, and other styles
14

Shei, Shaun. "A model-driven approach towards designing and analysing secure systems for multi-clouds." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/53c11a93-3d8d-4cbe-82df-deb34be6ab1f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Spillner, Josef. "Untersuchungen zur Risikominimierungstechnik Stealth Computing für verteilte datenverarbeitende Software-Anwendungen mit nutzerkontrollierbar zusicherbaren Eigenschaften." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-203797.

Full text
Abstract:
Die Sicherheit und Zuverlässigkeit von Anwendungen, welche schutzwürdige Daten verarbeiten, lässt sich durch die geschützte Verlagerung in die Cloud mit einer Kombination aus zielgrößenabhängiger Datenkodierung, kontinuierlicher mehrfacher Dienstauswahl, dienstabhängiger optimierter Datenverteilung und kodierungsabhängiger Algorithmen deutlich erhöhen und anwenderseitig kontrollieren. Die Kombination der Verfahren zu einer anwendungsintegrierten Stealth-Schutzschicht ist eine notwendige Grundlage für die Konstruktion sicherer Anwendungen mit zusicherbaren Sicherheitseigenschaften im Rahmen ein
APA, Harvard, Vancouver, ISO, and other styles
16

SHARMA, JYOTSNA. "DESIGN METHODOLOGY FOR SECURE CLOUD SYSTEMS." Thesis, 2015. http://dspace.dtu.ac.in:8080/jspui/handle/repository/17485.

Full text
Abstract:
Cloud computing popularity over traditional software and hardware has increased considerably over last decade. The on-demand, scalable, multi-tenant and measured service provisioning is making Cloud Computing and Services a hot favorite among not only industry big players but small to medium scale SMEs. As companies, customers and end users are moving their business and data to cloud, more concerns over Cloud Security is getting raised. As more and more software vulnerabilities are getting exploited by attackers and malicious users, huge cost is been spent in security attacks mitigation. This
APA, Harvard, Vancouver, ISO, and other styles
17

Tysowski, Piotr Konrad. "Highly Scalable and Secure Mobile Applications in Cloud Computing Systems." Thesis, 2013. http://hdl.handle.net/10012/7449.

Full text
Abstract:
Cloud computing provides scalable processing and storage resources that are hosted on a third-party provider to permit clients to economically meet real-time service demands. The confidentiality of client data outsourced to the cloud is a paramount concern since the provider cannot necessarily be trusted with read access to voluminous sensitive client data. A particular challenge of mobile cloud computing is that a cloud application may be accessed by a very large and dynamically changing population of mobile devices requiring access control. The thesis addresses the problems of achieving effi
APA, Harvard, Vancouver, ISO, and other styles
18

LEE, KUN-CHE, and 李坤哲. "A Novel Secure Data Exchange Scheme for Cloud Manufacturing Systems based on Disposable Key-based Data Coding Scheme." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/aq5ew6.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊工程學系<br>106<br>In recent years, cloud manufacturing (CMfg) (i.e., cloud-based manufacturing) has become a hot research topic for smart manufacturing. The concept of CMfg is to encapsulate and virtualize distributed manufacturing resources (both hardware and software) into cloud services (i.e., manufacturing services) that can then be used on-demand over networks to support manufacturing activities, including product design, simulation, testing, and other equipment services (e.g., fault diagnosis, prognosis, and predictive maintenance). A CMfg system can utilize Internet of Th
APA, Harvard, Vancouver, ISO, and other styles
19

(7013471), NIRANJAN RAVI. "Integration of UAVS with Real Time Operating Systems and Establishing a Secure Data Transmission." Thesis, 2019.

Find full text
Abstract:
In today’s world, the applications of Unmanned Aerial Vehicle (UAV) systems are leaping by extending their scope from military applications on to commercial and medical sectors as well. Owing to this commercialization, the need to append external hardware with UAV systems becomes inevitable. This external hardware could aid in enabling wireless data transfer between the UAV system and remote Wireless Sensor Networks (WSN) using low powered architecture like Thread, BLE (Bluetooth Low Energy). The data is being transmitted from the flight controller to the ground control station using a MAVlink
APA, Harvard, Vancouver, ISO, and other styles
20

Huang, Yu-Ping, and 黃宇平. "FileFarm: A Secured Cloud-of-Clouds Storage System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/zfanq5.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電信工程學研究所<br>107<br>In this thesis, we describe FileFarm: a secured storage overlay that leverages existing cloud services to form a cloud-of-clouds storage system with better robustness, no single-point-of-failure and minimal data leakage concerns. To resolve the consistency and load-balancing issues caused by a centralized database design in conventional cloud-of-clouds work, FileFarm adopts a P2P strategy, in which each cloud operates as an independent node providing identical service for clients. The storage nodes, called farmers, cooperate with each other to form a peer-to-
APA, Harvard, Vancouver, ISO, and other styles
21

Stauffer, Jake. "A Smart and Interactive Edge-Cloud Big Data System." Thesis, 2021. http://dx.doi.org/10.7912/C2/75.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>Data and information have increased exponentially in recent years. The promising era of big data is advancing many new practices. One of the emerging big data applications is healthcare. Large quantities of data with varying complexities have been leading to a great need in smart and secure big data systems. Mobile edge, more specifically the smart phone, is a natural source of big data and is ubiquitous in our daily lives. Smartphones offer a variety of sensors, which make them a very valuable source of data that can be used for a
APA, Harvard, Vancouver, ISO, and other styles
22

Chiang, Chao-hsun, and 蔣朝勛. "The implementation of secure cloud storage caching system." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/kmd8p9.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>102<br>Cloud storage is very popular in recent years. People usually store their important data in cloud storage. However, the cloud storage provider might secretly access our data. It is really a big threats to personal privacy and confidentially of business information. Even if we want to build our own cloud storage system, it will cost a lot of resources. This paper will discuss on how to implement a secure cloud storage caching system. The system consists of two main parts: local cache server and the connection between local cache server and cloud storage. User
APA, Harvard, Vancouver, ISO, and other styles
23

Huang, Kuan-Ying, and 黃冠穎. "A Secure and Elastic Cloud Data Encryption System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/18084299885303990794.

Full text
Abstract:
碩士<br>國立交通大學<br>網路工程研究所<br>100<br>“Cloud computing” is quite popular in recent years, more and more service provider proposed cloud services especially cloud storage service. The cloud storage service brought many conveniences, for instance, users do not have to carry flash storage drives. The file could be accessed by using the computers or mobile devices via network at anytime and anywhere. Users do not need to care about the uploaded file that could be lost, because the service provider provides special techniques to backup. However, the most worrying problem that we care is security. The
APA, Harvard, Vancouver, ISO, and other styles
24

Santos, João Manuel Ferreira dos. "Chameleon: A Secure Cloud-Enabled and Queryable System with Elastic Properties." Master's thesis, 2021. http://hdl.handle.net/10362/135419.

Full text
Abstract:
There are two dominant themes that have become increasingly more important in our technological society. First, the recurrent use of cloud-based solutions which provide infrastructures, computation platforms and storage as services. Secondly, the use of applicational large logs for analytics and operational monitoring in critical systems. Moreover, auditing activities, debugging of applications and inspection of events generated by errors or potential unexpected operations - including those generated as alerts by intrusion detection systems - are common situations where extensive logs mu
APA, Harvard, Vancouver, ISO, and other styles
25

Zhong, Huai-Bin, and 鍾懷彬. "Implementation of Secure Mobile Medical Information System Based on Private Cloud." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/00345895432490564438.

Full text
Abstract:
碩士<br>國立勤益科技大學<br>電子工程系<br>102<br>Mobile technology and Applications are growing rapidly which provide another service way. In the area of Engineering in Medicine and Biology, which contains Hospital Information System (HIS), Radiology Information System (RIS) and Picture Archive and Communication Systems (PACS), and it is a positively affected by new technology and availability. PACS is one of popular research area at mobile technology and application, and it is an evolving healthcare technology for the short and long term storage, retrieval, management, distribution and presentation of medic
APA, Harvard, Vancouver, ISO, and other styles
26

Kumar, Ramesh. "A Secure Framework for Cloud Based Intelligent Transportation System(C-ITS)." Thesis, 2016. http://ethesis.nitrkl.ac.in/8110/1/2016_MT__214CS2134_Secure.pdf.

Full text
Abstract:
Intelligent Transportation System(ITS)currently plays a critical role in transportation network providing the efficiency in traffic management, reducing accidents resulting in timesaving and increased customer satisfaction. The main challenges of ITS, however, are to manage the authenticity, confidentiality and preserving the privacy of the customers. The vision of all vehicle to be connected brings the new challenge of maintenance of massive vehicular data produced. With the advancement of cloud technology one cloud consider it as a decent candidate. In this paper, we propose a novel framewor
APA, Harvard, Vancouver, ISO, and other styles
27

Lin, Cheng-Ting, and 林正庭. "A Secret-Sharing-Based Method for Cloud Storage System." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69726621877613632163.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>104<br>In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many information security issues. The technical of secret sharing is applied to solve these problem include data privacy, data integrity and computational cost. Nevertheless, applying Shamir’s secret sharing scheme to cloud storage system, there are two fetal problems. When we upload the file to the cloud storage system, the size of each share equals to the file such that it waste amount of storage to save the
APA, Harvard, Vancouver, ISO, and other styles
28

HUANG, PO-TSUN, and 黃柏尊. "A Secure Electronic Medical Record (EMR) Authorization System for Smart Device Application in Cloud Computing Environments." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9rt3pj.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊工程系<br>107<br>As cloud computing technology matures, along with an increased application of distributed networks, increasingly larger amounts of data are being stored in the cloud, and is thus available for pervasive application. At the same time, current independent medical record systems tend to be inefficient, and most previous studies in this field fail to meet the security requirements of anonymity and unlinkability. Some proposed schemes are even vulnerable to malicious impersonation attacks. The scheme proposed in this study therefore combines public and private clouds
APA, Harvard, Vancouver, ISO, and other styles
29

Hussain, Mohammed. "The Design and Applications of a Privacy-Preserving Identity and Trust-Management System." Thesis, 2010. http://hdl.handle.net/1974/5520.

Full text
Abstract:
Identities are present in the interactions between individuals and organizations. Online shopping requires credit card information, while e-government services require social security or passport numbers. The involvement of identities, however, makes them susceptible to theft and misuse. The most prominent approach for maintaining the privacy of individuals is the enforcement of privacy policies that regulate the flow and use of identity information. This approach suffers two drawbacks that severely limit its effectiveness. First, recent research in data-mining facilitates the fusion of parti
APA, Harvard, Vancouver, ISO, and other styles
30

Cheperdak, David J. B. "Attribute-based access control for distributed systems." Thesis, 2012. http://hdl.handle.net/1828/4561.

Full text
Abstract:
Securing information systems from cyber attacks, malware and internal cyber threats is a difficult problem. Attacks on authentication and authorization (access control) is one of the more predominant and potentially rewarding attacks on distributed architectures. Attribute-Based Access Control (ABAC) is one of the more recent mechanisms to provide access control capabilities. ABAC combines the strength of cryptography with semantic expressions and relational assertions. By this composition, a powerful grammar is devised that can not only define complex and scalable access control polici
APA, Harvard, Vancouver, ISO, and other styles
31

Chu, Yu Chen, and 朱祐呈. "A System for Integrating Multiple Cloud Storage Services: Implementation of Secured and Synchronized Desktop Applications." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/44229925530222294705.

Full text
Abstract:
碩士<br>國立清華大學<br>通訊工程研究所<br>103<br>In recent years, due to rapid advancement in network and computer technologies, cloud services have been gradually developed. Among all cloud services, online storage or cloud storage attracts a lot of attention. Many companies, such as Dropbox, Google and etc. have started offering cloud storage services. Being able to access our data from anywhere and at any time, the convenience offered by cloud storage services has fundamentally changed our daily lives. However, the cloud storage services offered by commercial companies in their current form have two dr
APA, Harvard, Vancouver, ISO, and other styles
32

Spillner, Josef. "Untersuchungen zur Risikominimierungstechnik Stealth Computing für verteilte datenverarbeitende Software-Anwendungen mit nutzerkontrollierbar zusicherbaren Eigenschaften." Doctoral thesis, 2015. https://tud.qucosa.de/id/qucosa%3A29546.

Full text
Abstract:
Die Sicherheit und Zuverlässigkeit von Anwendungen, welche schutzwürdige Daten verarbeiten, lässt sich durch die geschützte Verlagerung in die Cloud mit einer Kombination aus zielgrößenabhängiger Datenkodierung, kontinuierlicher mehrfacher Dienstauswahl, dienstabhängiger optimierter Datenverteilung und kodierungsabhängiger Algorithmen deutlich erhöhen und anwenderseitig kontrollieren. Die Kombination der Verfahren zu einer anwendungsintegrierten Stealth-Schutzschicht ist eine notwendige Grundlage für die Konstruktion sicherer Anwendungen mit zusicherbaren Sicherheitseigenschaften im Rahmen ein
APA, Harvard, Vancouver, ISO, and other styles
33

Yu-TingHuang and 黃鈺婷. "An SLA-aware Data Dispersion Method for Short-Secret-Sharing Cloud Storage System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/24484662428767207595.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>101<br>In the era of information explosion, people usually share various kinds of information through networks. As more information is going to be shared and stored, the maintenance costs of data also increase. Since cloud storage systems have large storage space, high transmission bandwidth, and the supports of data maintenance, the management costs of clients can further be reduced, and therefore more companies would like to outsource their data into cloud storage systems. However, because of the lacks of physical controls of data, the data security and the data
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!