Keyphrases
- computing infrastructure
- data encryption
- cloud computing
- cost effective
- data processing
- cloud services
- network security
- personal computer
- digital rights management
- case study
- security requirements
- information processing systems
- access control
- information security
- security issues
- cloud computing environment
- sensor technology
- authentication protocol
- virtual machine
- data management