2015
DOI: 10.1016/j.procs.2015.04.171
|View full text |Cite
|
Sign up to set email alerts
|

Data Security Challenges and Its Solutions in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
59
0
7

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 158 publications
(66 citation statements)
references
References 6 publications
0
59
0
7
Order By: Relevance
“…In addition, sometime the cloudshared architecture also puts a cloud service user at the risk from other cloud user if users themselves with their bad behaviour draw attention from either bad media publicity or law enforcement [48]. Moreover, in a traditional architecture, personal computers inside the organizations may be at risk of compromises throughout a host of attack vectors utilizing some local applications such as documents viewers or internet browsers [49]. Some of the hackers can compromise credentials to gain and get access to the user's cloud computer (cloud storage service) privileges and permissions even though the less data has been stored locally [43].…”
Section: Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, sometime the cloudshared architecture also puts a cloud service user at the risk from other cloud user if users themselves with their bad behaviour draw attention from either bad media publicity or law enforcement [48]. Moreover, in a traditional architecture, personal computers inside the organizations may be at risk of compromises throughout a host of attack vectors utilizing some local applications such as documents viewers or internet browsers [49]. Some of the hackers can compromise credentials to gain and get access to the user's cloud computer (cloud storage service) privileges and permissions even though the less data has been stored locally [43].…”
Section: Security Issuesmentioning
confidence: 99%
“…Some of the hackers can compromise credentials to gain and get access to the user's cloud computer (cloud storage service) privileges and permissions even though the less data has been stored locally [43]. A compromise to the whole Gmail's database might just begin with a compromised personal computer [49]. One of the examples, an attack has happened in year 2009 on the management team of Twitter Company.…”
Section: Security Issuesmentioning
confidence: 99%
“…2. The presentation of the threats in Cloud Computing [28] According to research conducted in [28] and shown in Figure 2, a key security factors of cloud computing are identified. Those factors are related to the data leakage prevention (88% -critical / very important) and the data segregation and protection (92% -critical / very important).…”
Section: Security Aspect Of the Middleware Layermentioning
confidence: 99%
“…The notion of information distribution over numerous cloud service supplier's location instead of central dissemination of information was put [14].…”
Section: Introductionmentioning
confidence: 99%