2013
DOI: 10.1016/j.jksuci.2012.06.002
|View full text |Cite
|
Sign up to set email alerts
|

A cybersecurity model in cloud computing environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(40 citation statements)
references
References 13 publications
0
38
0
2
Order By: Relevance
“…Most of the existing work [27][28][29] on the data privacy preservation is based on web services, which address the issues of data control and security in a cloud environment. This includes data access, data integrity, data recovery, data separation, data disposition, and data regulations [27].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the existing work [27][28][29] on the data privacy preservation is based on web services, which address the issues of data control and security in a cloud environment. This includes data access, data integrity, data recovery, data separation, data disposition, and data regulations [27].…”
Section: Related Workmentioning
confidence: 99%
“…Sengupta et al [28] addressed the cloud security and privacy concerns such as data access, data compliance, and cloud hosted code. Rabai et al [29] introduced a quantitative cloud security model which helps the subscribers and providers to measure the security risks related to the resources. The model assists the subscribers and providers to investigate and identify the security related issues.…”
Section: Related Workmentioning
confidence: 99%
“…The main requirements for information security are data integrity that refers to the guarantee that users' data are not modified without authorization [10,13], in other words, data can be modified only by authorized users. In order to provide data integrity from both the provider and subscriber perspectives, secure encryption algorithms are generally used.…”
Section: Data Securitymentioning
confidence: 99%
“…There several cyber-security threats that may face the cloud services availability. These are network based attacks such as Distributed Denial of Service (DDoS) attacks [10]. To ensure the safety and the availability of data, cloud providers should maintain an appropriate action plan for risk management to deal efficiently with these threats and to guarantee the cloud based services continuity [9].…”
Section: Data Securitymentioning
confidence: 99%
“…Security concerns raised by cloud computing are generally provider-related vulnerabilities, additional security concerns, availability, and third party data control [7].…”
Section: Cloud Perspectivementioning
confidence: 99%