2017
DOI: 10.1504/ijcat.2017.082865
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing security: challenges and future trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(17 citation statements)
references
References 0 publications
0
17
0
Order By: Relevance
“…To ensure that the patient-doctor relationship runs smoothly, patients must have faith in the healthcare system to keep their data private [ 17 ]. Studies have shown that confidentiality may be achieved by access control [ 52 , 62 ] and authentication [ 45 , 76 ]. A Mutual Authentication and Secret Key (MASK) establishment protocol has been presented by Masud et al in the field of the Internet of Medical Things (IoMT) in COVID-19 patients.…”
Section: Discussionmentioning
confidence: 99%
“…To ensure that the patient-doctor relationship runs smoothly, patients must have faith in the healthcare system to keep their data private [ 17 ]. Studies have shown that confidentiality may be achieved by access control [ 52 , 62 ] and authentication [ 45 , 76 ]. A Mutual Authentication and Secret Key (MASK) establishment protocol has been presented by Masud et al in the field of the Internet of Medical Things (IoMT) in COVID-19 patients.…”
Section: Discussionmentioning
confidence: 99%
“…Customer assets are subject to information discretion and privacy due to a lack of sovereignty information. 3,52 10. Data scavenging: Because records cannot be erased if the device is destroyed, an attacker could be able to obtain more dynamic information.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…Service disruptions are caused by an engine failure, the inaccessibility of cloud services, or the cloud business enterprise's insufficient benefit supply capacity. 52 12. Data leakage: When documents are transferred, stored, modified, or evaluated after they fall into the wrong hands.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
See 2 more Smart Citations