2018 Cyber Resilience Conference (CRC) 2018
DOI: 10.1109/cr.2018.8626872
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Challenges in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The PaaS offers a software development platform to users. Users are responsible for protecting the applications they build and run on their platform 35 . Such platforms include tools for creating, testing and implementing application software, database management systems, middleware and the programming environment that is given by the cloud provider 33 .…”
Section: Cloud Computing Conceptsmentioning
confidence: 99%
“…The PaaS offers a software development platform to users. Users are responsible for protecting the applications they build and run on their platform 35 . Such platforms include tools for creating, testing and implementing application software, database management systems, middleware and the programming environment that is given by the cloud provider 33 .…”
Section: Cloud Computing Conceptsmentioning
confidence: 99%
“…The approach used the multiple authority attribute based control access by using the dynamic location of the users and embedding it as a one attribute in computation of key and distributing the parameters over the set of users in cloud environment. Prosanta Gope and Ashok Kumar Das [7] proposed the manual authentication scheme for mobile users and cloud service providers by providing their legitimacy to enrich the confidence of the mobile users for using the services provided by the cloud, where n value depends on the level of the user paid for.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the Korea national defense information system and they have insight the security requirements needs. In 2018, Abdullah and Bakar [15] suggested that the cloud computing provides an intermediate act for providing the virtualization synergy support. They have also suggested that the security in case of data storage is a bigger challenge in case of cloud computing.…”
Section: Related Workmentioning
confidence: 99%