2019 2nd International Conference on Computer Applications &Amp; Information Security (ICCAIS) 2019
DOI: 10.1109/cais.2019.8769497
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on the Security of Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 30 publications
0
12
0
Order By: Relevance
“…In the study of [26], a survey reviewed and evaluated major attacks targeting the security of Cloud Computing and presented solutions and potential countermeasures to serve as a benchmark for comparative research. This study lacked techniques to solve some major security challenges.…”
Section: Existing Surveysmentioning
confidence: 99%
“…In the study of [26], a survey reviewed and evaluated major attacks targeting the security of Cloud Computing and presented solutions and potential countermeasures to serve as a benchmark for comparative research. This study lacked techniques to solve some major security challenges.…”
Section: Existing Surveysmentioning
confidence: 99%
“…Data privacy and security issues in cloud computing include hacking, phishing, the introduction of malware, identity fraud, electronic theft, and unauthorized disclosure of access codes and security passwords (Alhenaki et al, 2019). It is imperative that the institutions uphold patient confidentiality in the management of healthcare data.…”
Section: Main Legal Considerations On Cloud Computing In Kenyamentioning
confidence: 99%
“…Hyperjacking is an attack on the hypervisor, in which the hacker injects a rogue hypervisor or takes malicious control over the installed hypervisor between the target system and the hardware to controls the whole internal server resources within a virtualized cloud environment. The attacker tries to attack the target operating system below the VMs to execute its malicious code and applications on VM [48]. The most important thing about hypervisor is that attackers can efficiently run unauthorized applications over the system without realizing the presence of any suspicious activity to the administrator.…”
Section: Hyperjackingmentioning
confidence: 99%