Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 871430, 6 pages
http://dx.doi.org/10.1155/2013/871430
Research Article

A Novel Cloud Computing Algorithm of Security and Privacy

1Department of Information Management, St. John’s University, 499 Section 4, Tam King Road, Tamsui District, New Taipei City 25135, Taiwan
2Department of Electronic Engineering, St. John’s University, 499 Section 4, Tam King Road, Tamsui District, New Taipei City 25135, Taiwan

Received 12 September 2013; Accepted 12 October 2013

Academic Editor: Teen-Hang Meen

Copyright © 2013 Chih-Yung Chen and Jih-Fu Tu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Armbrust, A. Fox, R. Griffith et al., Above the Clouds: A Berkeley View of Cloud Computing, 2011.
  2. L. Gu and S.-C. Cheung, “Constructing and testing privacy-aware services in a cloud computing environment—challenges and opportunities,” in Proceedings of the 1st Asia-Pacific Symposium on Internetware (Internetware '09), October 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On technical security issues in cloud computing,” in Proceedings of the IEEE International Conference on Cloud Computing (CLOUD '09), pp. 109–116, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. J. B. Horrigan, “Use of cloud computing applications and services,” Pew Internet & American Life Project Memo, 2008. View at Google Scholar
  5. M. Mowbray and S. Pearson, “A client-based privacy manager for cloud computing,” in Proceedings of the 4th International ICST Conference on Communication System Software and Middleware (COMSWARE '09), Dublin, Ireland, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Pearson, “Taking account of privacy when designing cloud computing services,” in Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing (CLOUD '09), pp. 44–52, Vancouver, Canada, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. B. R. Kandukuri, P. V. Ramakrishna, and A. Rakshit, “Cloud security issues,” in Proceedings of the IEEE International Conference on Services Computing (SCC '09), pp. 517–520, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. L.-J. Zhang and Q. Zhou, “CCOA: cloud computing open architecture,” in Proceedings of the IEEE International Conference on Web Services (ICWS '09), pp. 607–616, Los Angeles, Calif, USA, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. Amazon Elastic Compute Cloud—EC2, http://aws.amazon.com/ec2/.
  10. Cloud Computing Trends, http://trends.google.com/trends.
  11. L. Robert and G. Yunhong, On the Varieties of Clouds for Data Intensive Computing, 2009.
  12. Wikipedia, CloudComputing, http://en.wikipedia.org/wiki/Cloud_computing#cite_note-idc-28.
  13. The Royal Academy of Engineering, Dilemmas of Privacy and Surveillance: Challenges of Technological Change, 2007.
  14. D. J. Solove, “A taxonomy of privacy,” University of Pennsylvania Law Review, vol. 154, no. 3, pp. 477–564, 2006. View at Google Scholar · View at Scopus
  15. E. Bertino, Privacy-Preserving, Digital Identity Management for Cloud Computing, 2010.
  16. M. Mowbray and S. Pearson, “A client-based privacy manager for cloud computing,” in Proceedings of the 4th International ICST Conference on Communication System Software and Middleware (COMSWARE '09), Dublin, Ireland, June 2009. View at Publisher · View at Google Scholar · View at Scopus