Complying with Security Requirements in Cloud Storage Systems

  • Roman R
  • et al.
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

One of the necessary steps to ensure the security of cloud storage systems is to adequately protect the infrastructure itself - the hardware and software that implements the storage services. Starting from an analysis of the security requirements that affect these storage systems, this paper studies the different strategies and approaches that are currently used to fulfill such requirements. The goal of this paper is twofold. Firstly, we aim to analyze the security components that should be used to provide a basic level of protection to storage systems, examining the actual technologies that are used to construct them. Secondly, we aim to identify gaps in the provisioning of security services, highlighting any areas that need of further research.

Cite

CITATION STYLE

APA

Roman, R., Felipe, M. R., Gene, P. E., & Zhou, J. (2016). Complying with Security Requirements in Cloud Storage Systems. Journal of Computers, 11(3), 201–206. https://doi.org/10.17706/jcp.11.3.201-206

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free