2020
DOI: 10.1016/j.matpr.2020.10.655
|View full text |Cite|
|
Sign up to set email alerts
|

WITHDRAWN: A study on cloud computing challenges and its mitigations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Although open-source clouds like OpenStack, Eucalyptus, OpenNebula, and CloudStack are more and more expanding, it is not easy to migrate to the cloud infrastructure, especially for critical services such as banking, and health. Cloud computing, however, is not without its challenges, these challenges include data protection and privacy issues, unequal availability of services, restricted compatibility with existing apps and systems, and some poor regulatory structures [4]. In respect of searching to mitigate these challenges, new architectures are proposed by researchers, hence the advent of ICCEs.…”
Section: Interconnected Cloud Computing Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Although open-source clouds like OpenStack, Eucalyptus, OpenNebula, and CloudStack are more and more expanding, it is not easy to migrate to the cloud infrastructure, especially for critical services such as banking, and health. Cloud computing, however, is not without its challenges, these challenges include data protection and privacy issues, unequal availability of services, restricted compatibility with existing apps and systems, and some poor regulatory structures [4]. In respect of searching to mitigate these challenges, new architectures are proposed by researchers, hence the advent of ICCEs.…”
Section: Interconnected Cloud Computing Environmentmentioning
confidence: 99%
“…Platform as a service (PaaS) removes the need for companies to manage and develop conventional platforms to construct applications. Software as a service (SaaS) provides software hosting [4]. Cloud computing implement four models of deployment: i) public cloud, a multi-contributor framework that enables numerous tenants to share various web server resources; ii) private cloud, a single-contributor framework that allows the usage of cloud services by consumers; iii) hybrid cloud for private and public CSPs to share resources; and iv) federated cloud, in which numerous CSPs operate together under one authority [5].…”
Section: Introductionmentioning
confidence: 99%
“…Here, eavesdropping on the data can help the attacker modify the message. In addition, message relays can also be altered by the attacker [95]. This type of attack intends to obtain sensitive information being yielded, and then the attack can occur during an ongoing communication if the channel of communication is also compromised [96].…”
Section: Man-in-the-middle Attacksmentioning
confidence: 99%
“…In cloud environment, the user can access to the cloud services using a set of authentication methods that can determine the user identity. After verifying the user identity, a set of authorizations will be allowed for each user according to his privileges and level of control [1]. The cloud services will be provided for each user based on the user IP address, access level, and domain of data [2].…”
Section: Introductionmentioning
confidence: 99%