2020
DOI: 10.1007/s40860-020-00115-0
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(26 citation statements)
references
References 24 publications
0
26
0
Order By: Relevance
“…Cyberspace is a digital and virtual environment in which individuals may connect at any time and from any location by utilizing the Internet, computer networks, or other comparable tools. Cell phones, mobile telephones, iPhones, offline or online computer equipment, and any information saved or exchanged over computer networks, such as databases and electronic records, are all examples of modern technology [1]. Because of its ability to link individuals and groups in a variety of industries, cyberspace is currently seen as a huge leap forward in comparison to other major sectors in the world of progress.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Cyberspace is a digital and virtual environment in which individuals may connect at any time and from any location by utilizing the Internet, computer networks, or other comparable tools. Cell phones, mobile telephones, iPhones, offline or online computer equipment, and any information saved or exchanged over computer networks, such as databases and electronic records, are all examples of modern technology [1]. Because of its ability to link individuals and groups in a variety of industries, cyberspace is currently seen as a huge leap forward in comparison to other major sectors in the world of progress.…”
Section: Introductionmentioning
confidence: 99%
“…Healthcare: It is critical to provide a high-security level for the healthcare Cloud, and any business should expect a secure connection between healthcare providers and patients and a high-security level of data storage [1]. Furthermore, when such activities are supervised by healthcare experts and only patient or physician authentication procedures are employed, the confidentiality of electronic health data is achievable [103].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…e system structure is designed and developed for providing data security of the uploaded stream for communication and data processing for data sharing [39]. e major drawbacks of the existing system are that it is inefficient in cloud data security and lacks a security applicability selection procedure for the applicability of the security needs for reliable cloud communication.…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing is a driver which supports the Internet of Things, enabling the access to large datasets and its processing to generate new useful information through different types of reports. However, the cybersecurity is a pressing issue; [31] defines cybersecurity as a set of tools, policies and best practices, security concepts, guidelines, risk approaches, actions, assurance, and technologies necessary to protect the cyber environment, organization, and user's assets. • Cyber-physical system (CPS) is defined as a new generation system with integrated computational and physical capabilities that can interact with people through new modalities [32,33].…”
mentioning
confidence: 99%