Cloud security

Please read the paper “RunTest: assuring integrity of dataflow processing in cloud computing infrastructures” (http://dance.csc.ncsu.edu/papers/asiaccs10.pdf(Links to an external site.)). Then write the following:

(a) 3 strengths of the paper. (3)

(b) 3 weaknesses of the paper. (3)

(Note that you should focus on technical pros and cons … for example, is the attack realistic? Is it effective? etc. when answering the question)

What are the desirable properties of a remote data integrity solution? Write your answer in terms of the user (who creates the data), the cloud service provider, and the verifier’s (who wants to verify the integrity and availability of the data object later) point of view.

find the cost of your paper

This question has been answered.

Get Answer