2018
DOI: 10.1007/978-981-10-7323-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Countermeasures for Security and Privacy Issues in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The author presented a comprehensive analysis of cloud challenges and future research directions in [26] based on the existing literature. The authors in [27] emphasized the importance of addressing security issues in cloud computing, which is a shared concern for both cloud service providers and users. The authors effectively tackled the issue of cloud security by acknowledging the importance of security requirements and offering viable solutions to mitigate potential threats.…”
Section: Related Workmentioning
confidence: 99%
“…The author presented a comprehensive analysis of cloud challenges and future research directions in [26] based on the existing literature. The authors in [27] emphasized the importance of addressing security issues in cloud computing, which is a shared concern for both cloud service providers and users. The authors effectively tackled the issue of cloud security by acknowledging the importance of security requirements and offering viable solutions to mitigate potential threats.…”
Section: Related Workmentioning
confidence: 99%
“…In [70] the author proposed some critical cloud challenges and future research directions based on the literature. Authors in [71] focused on the identification of security issues in cloud computing that is a concern for both cloud service providers and users. They addressed cloud security by recognizing security requirements and proposing solutions to reduce these potential threats.…”
Section: Related Workmentioning
confidence: 99%
“…This attack can occur due to weak network security architecture, vulnerable applications, insecure network protocol etc. [4, 16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are numerous ways in which cloud computing technologies are implemented (using diverse architectures, services, and models) and operated (with a plethora of technologies, software, and applications), making it a substantial security challenge. Maintaining security is among the major responsibilities of the service provider [4, 5]. Cloud service providers are required to ensure that integrity, reliability, and confidentiality of data is not compromised [6].…”
Section: Introductionmentioning
confidence: 99%