A survey on security challenges in cloud computing: issues, threats, and solutions
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A survey on security challenges in cloud computing: issues, threats, and solutions
Authors
Keywords
-
Journal
JOURNAL OF SUPERCOMPUTING
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-02-28
DOI
10.1007/s11227-020-03213-1
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Survey of access control models and technologies for cloud computing
- (2018) Fangbo Cai et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Recent security challenges in cloud computing
- (2018) Nalini Subramanian et al. COMPUTERS & ELECTRICAL ENGINEERING
- A survey on technical threat intelligence in the age of sophisticated cyber attacks
- (2018) Wiem Tounsi et al. COMPUTERS & SECURITY
- Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
- (2018) Rodrigo Roman et al. Future Generation Computer Systems-The International Journal of eScience
- A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends
- (2018) Choon Beng Tan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Security threats to critical infrastructure: the human factor
- (2018) Ibrahim Ghafir et al. JOURNAL OF SUPERCOMPUTING
- A comprehensive survey on network anomaly detection
- (2018) Gilberto Fernandes et al. TELECOMMUNICATION SYSTEMS
- Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems -- A Systematic Review
- (2018) Harcharan Jit Singh et al. ACM COMPUTING SURVEYS
- A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method
- (2018) P.D. Bojović et al. COMPUTERS & ELECTRICAL ENGINEERING
- Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation
- (2018) Abdu Gumaei et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Systematic identification of threats in the cloud: A survey
- (2018) Jin B. Hong et al. Computer Networks
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- (2017) Yinghui Zhang et al. INFORMATION SCIENCES
- Intrusion detection techniques in cloud environment: A survey
- (2017) Preeti Mishra et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Ensuring Security and Privacy Preservation for Cloud Data Services
- (2016) Jun Tang et al. ACM COMPUTING SURVEYS
- Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems
- (2016) Daniele Sgandurra et al. ACM COMPUTING SURVEYS
- SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods
- (2016) Aviad Cohen et al. EXPERT SYSTEMS WITH APPLICATIONS
- Cloud-centric multi-level authentication as a service for secure public safety device networks
- (2016) Ismail Butun et al. IEEE COMMUNICATIONS MAGAZINE
- A communications jamming taxonomy
- (2016) Marc Lichtman et al. IEEE SECURITY & PRIVACY
- Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
- (2016) Opeyemi Osanaiye et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Web application protection techniques: A taxonomy
- (2016) Victor Prokhorenko et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of security issues for cloud computing
- (2016) Minhaj Ahmad Khan JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
- (2016) Salman Iqbal et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey on cloud computing security: Issues, threats, and solutions
- (2016) Saurabh Singh et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Resource stealing: a resource multiplexing method for mix workloads in cloud system
- (2016) Yusong Tan et al. JOURNAL OF SUPERCOMPUTING
- Continuous user authentication using multi-modal biometrics
- (2015) Hataichanok Saevanee et al. COMPUTERS & SECURITY
- The rise of “big data” on cloud computing: Review and open research issues
- (2015) Ibrahim Abaker Targio Hashem et al. INFORMATION SYSTEMS
- Consolidated Identity Management System for secure mobile cloud computing
- (2014) Issa Khalil et al. Computer Networks
- Governance of Cloud Computing Services for the Life Sciences
- (2014) Srdan Dzombeta et al. IT Professional
- Security issues in cloud environments: a survey
- (2013) Diogo A. B. Fernandes et al. International Journal of Information Security
- Cloud computing security: The scientific challenge, and a survey of solutions
- (2013) Mark D. Ryan JOURNAL OF SYSTEMS AND SOFTWARE
- From cloud computing to cloud manufacturing
- (2011) Xun Xu ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING
- A survey on security issues in service delivery models of cloud computing
- (2010) S. Subashini et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now