2018
DOI: 10.1007/978-981-13-1882-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Major Vulnerabilities and Their Prevention Methods in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…However, V-BOINC have been modified to allow customized data flow among the server. For instance, for upgrading the server on the VM status, BOINC enables client-server connection through sending XML messages that were interpreted locally by the received object; the host's information is transmitted to the server [ 63 ]. The authenticator identifies the (Host, BOINC version and Platform Type), the V-BOINC was restricted from consuming no more than the accessibility of 90% from the memory by the volunteer users, which provided in the volunteer host idle state.…”
Section: Proposed Modelmentioning
confidence: 99%
“…However, V-BOINC have been modified to allow customized data flow among the server. For instance, for upgrading the server on the VM status, BOINC enables client-server connection through sending XML messages that were interpreted locally by the received object; the host's information is transmitted to the server [ 63 ]. The authenticator identifies the (Host, BOINC version and Platform Type), the V-BOINC was restricted from consuming no more than the accessibility of 90% from the memory by the volunteer users, which provided in the volunteer host idle state.…”
Section: Proposed Modelmentioning
confidence: 99%
“…The primary objective of the author in [10] is to define a consistent taxonomy for security needs, threats, vulnerabilities, and responses in order to carry out the suggested end-to-end mapping. Using an agent-based model, provides a methodology for identifying cyber security threats in the construction sector and analyses the vulnerability of traditional and hybrid delivery methods (ABM).…”
Section: Related Workmentioning
confidence: 99%
“…Since a majority of the medical data and patient information is highly sensitive and confidential, it is treacherous to depend on third party centralized servers for storage. Third party entities increase the security risks and can lead to attacks such as denial of service (DoS) or distributed denial of service (DDoS) attacks (John and Norman, 2019) and ransomware attacks, which have greater potential to breach the security protocols (Thamer & Alubady, 2021;Gopinath and Olmsted, 2022). Considering the susceptibility of medical data and patient information, it is crucial to secure the data by implementing a robust and efficient technique which can securely store and share the data across multiple stakeholders (Singh et al, 2021;Hathaliya & Tanwar, 2020;Awotunde et al, 2021).…”
Section: Introductionmentioning
confidence: 99%