Academic literature on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"

1

Uddin, Mueen, Anjum Khalique, Awais Khan Jumani, Syed Sajid Ullah, and Saddam Hussain. "Next-Generation Blockchain-Enabled Virtualized Cloud Security Solutions: Review and Open Challenges." Electronics 10, no. 20 (2021): 2493. http://dx.doi.org/10.3390/electronics10202493.

Full text
Abstract:
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for
APA, Harvard, Vancouver, ISO, and other styles
2

Renjith, E. Jeslin. "Revolutionizing Cloud Security: Innovative Approaches for Safeguarding Data Integrity." FMDB Transactions on Sustainable Computer Letters 2, no. 2 (2024): 111–19. http://dx.doi.org/10.69888/ftscl.2024.000185.

Full text
Abstract:
Cloud computing uses third-party servers or private clouds to provide online services and on-demand enterprise resource access. Microsoft Azure, Amazon, IBM, and Google Apps allow customers to design and run cloud-based apps from anywhere. These cloud services store and retrieve data from faraway servers, highlighting the importance of security due to internet data transfer. Before using cloud computing, firms must handle security issues. Pay-per-use, self-service, and scalability make the model popular in banking, healthcare, retail, education, manufacturing, and business. Pay-per-use models
APA, Harvard, Vancouver, ISO, and other styles
3

Pragya, Rathore, and Mishra Sachin. "5G Security Challenges & Solutions: A Comprehensive Survey." International Journal for Research Trends and Innovation 9, no. 5 (2024): 517–32. https://doi.org/10.5281/zenodo.11568989.

Full text
Abstract:
5G technology offers faster connections than ever before, but it also poses a variety of new security vulnerabilities. 5G is expected to enhance user mobility, and facilitate ultra-reliable and cost-effective networking of a vast array of devices, including the Internet of Things (IoT).  The primary technology accelerators, including Network Function Virtualization (NFV), Software Defined Networking (SDN), and cloud computing, are developing in preparation for their application in 5G.  This paper describes the primary 5G security issues and provides workarounds for these problems. Th
APA, Harvard, Vancouver, ISO, and other styles
4

Adi, Maheswara Reddy G. 1. Dr K. Venkata Rao2 Dr JVR Murthy3. "AN EFFECTIVE AND SECURED TECHNIQUE FOR SIDE-CHANNEL ATTACKS IN CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 11 (2017): 226–33. https://doi.org/10.5281/zenodo.1049426.

Full text
Abstract:
Nowadays in cloud based business services have risks of side channel attacks. Cache-based side channel attack, cross-VM side channel attacks are the serious threat and security pitfall under same cloud network services. In order to provide more security and less infrastructure investment leads to challenging task. In this paper, the discussions on various levels of attacks on VM ware based solution under same cloud network computing, vulnerabilities to other cloud services, security weakness and counter measures in cryptographic algorithms.
APA, Harvard, Vancouver, ISO, and other styles
5

Misono, Masanori, Dimitrios Stavrakakis, Nuno Santos, and Pramod Bhatotia. "Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–42. https://doi.org/10.1145/3700418.

Full text
Abstract:
Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the programmability and usability challenges of the previously proposed enclave-based trusted computing technologies. CVM hardware extensions facilitate secure, hardware-isolated encrypted VMs, promoting programmability and easier deployment in cloud infrastructures. However, differing microarchitectural features, interfaces, and security properties among hardwa
APA, Harvard, Vancouver, ISO, and other styles
6

Bobda, Christophe, Joel Mandebi Mbongue, Paul Chow, et al. "The Future of FPGA Acceleration in Datacenters and the Cloud." ACM Transactions on Reconfigurable Technology and Systems 15, no. 3 (2022): 1–42. http://dx.doi.org/10.1145/3506713.

Full text
Abstract:
In this article, we survey existing academic and commercial efforts to provide Field-Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a critical review of existing systems and a discussion of their evolution from single workstations with PCI-attached FPGAs in the early days of reconfigurable computing to the integration of FPGA farms in large-scale computing infrastructures. From the lessons learned, we discuss the future of FPGAs in datacenters and the cloud and assess the challenges likely to be encountered along the way. The article explores current arch
APA, Harvard, Vancouver, ISO, and other styles
7

N, Saravanan, and Umamakeswari A. "Security Vulnerabilities of Virtualization Technique." International Journal of Engineering & Technology 7, no. 2.24 (2018): 478. http://dx.doi.org/10.14419/ijet.v7i2.24.12140.

Full text
Abstract:
Cloud computing is a computing model for delivering resources in a convenient manner from a shared pool. The resources provisioned and released on an on-demand basis with minimal intervention of service provider. Cloud Computing is becoming the platform for all kind of web based services. Virtualization is the key concept to adopt the cloud computing. Virtualization offers many benefits comparing to real physical machine implementation infrastructure. Even though virtualization provides lots of benefits, it is also brings several security vulnerabilities. This paper presents the security breac
APA, Harvard, Vancouver, ISO, and other styles
8

Sabir Abbas and Shan-e-Zahra. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 2 (2018): 32–37. http://dx.doi.org/10.54692/lgurjcsit.2018.020234.

Full text
Abstract:
The cloud computing virtualization stage, services as another method for giving computing resources, gives clients available and financially savvy benefits, and brings hazards in the meantime. In this way, ensuring the privacy, trustworthiness, and accessibility of client information turns out to be significantly more basic to distributed computing frameworks. Huawei gives the virtualization stage security answers to confront the dangers and difficulties postured to the distributed computing framework. This article portrays the techniques and measures received by Huawei cloud computing virtual
APA, Harvard, Vancouver, ISO, and other styles
9

Sabir Abbas, Shan-E- Zahra, and Noor Ul Qamar. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 1, no. 4 (2017): 58–63. https://doi.org/10.54692/lgurjcsit.2017.010415.

Full text
Abstract:
The cloud computing virtualization stage is another method for giving computing resources that give clients available and financially savvy benefits, and bring hazards in meantime. In this way, ensuring the privacy, trustworthiness and accessibility of client information turns out to be significantly more basic to distributed computing frameworks. Huawei gives the virtualization stage security answers for confronting the dangers and difficulties postured to the distributed computing framework. This article portrays the techniques and measures received by Huawei cloud computing virtualization s
APA, Harvard, Vancouver, ISO, and other styles
10

Saugatdeep, Ranabhat, Alexey N. Nazarov, and Tuleun Terhemen Daniel. "VIRTUALIZATION SECURITY: A GATEWAY TO SECURE CLOUD COMPUTING." SYNCHROINFO JOURNAL 8, no. 6 (2022): 2–9. http://dx.doi.org/10.36724/2664-066x-2022-8-6-2-9.

Full text
Abstract:
Lately, the most efficient solution for an organization and individual of internet based distributed computing platforms is cloud computing. Processing, storage, and data management are just a few of the useful services that end users can get from cloud computing. However, it raises a lot of issues with privacy and security which needs to be resolved. Major component of cloud computing is virtualization technology, which helps to develop complex cloud services based on the externalization and composition of these resources. The primary concern with cloud computing security is virtualization se
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"

1

Alruwaili, Fahad F. "Information security, privacy, and compliance models for cloud computing services." Thesis, 2016. http://hdl.handle.net/1828/7119.

Full text
Abstract:
The recent emergence and rapid advancement of Cloud Computing (CC) infrastructure and services have made outsourcing Information Technology (IT) and digital services to Cloud Providers (CPs) attractive. Cloud offerings enable reduction in IT resources (hardware, software, services, support, and staffing), and provide flexibility and agility in resource allocation, data and resource delivery, fault-tolerance, and scalability. However, the current standards and guidelines adopted by many CPs are tailored to address functionality (such as availability, speed, and utilization) and design requireme
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"

1

Naik, Darshana A., G. Shruthi, A. Ashwitha, and Pramod Sunagar. "Security Concerns of Virtualization in Cloud Computing." In Privacy and Security Challenges in Cloud Computing. CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tariq, Muhammad Imran, Shahzadi Tayyaba, Muhammad Arfan Jaffar, Muhammad Waseem Ashraf, Shariq Aziz Butt, and Muhammad Arif. "Information security framework for cloud and virtualization security." In Security and Privacy Trends in Cloud Computing and Big Data. CRC Press, 2022. http://dx.doi.org/10.1201/9781003107286-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Perilli, Michele Livio, Michelangelo De Bonis, and Crescenzio Gallo. "Cloud Computing." In Contemporary Challenges for Cyber Security and Data Privacy. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-1528-6.ch001.

Full text
Abstract:
Cloud computing involves large numbers of computers connected through a network that can be physically located anywhere. Providers rely heavily on virtualization to deliver their cloud computing services. Cloud computing can reduce operational costs by using resources more efficiently. Starting with a look at cloud types, such as software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), and cloud models such as public clouds, private clouds, hybrid clouds, community clouds, difference between a data center and cloud computing with relative advantages are e
APA, Harvard, Vancouver, ISO, and other styles
4

Kadyan, Rubi, Sunita Rani, and Vinod Kr Saroha. "Cloud Security and Privacy." In Cloud Computing's Transformative Power in Computing Environments. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-9984-2.ch006.

Full text
Abstract:
This chapter explores the key security threats and vulnerabilities at different levels, such as SaaS, PaaS and IaaS in cloud computing and provides their solutions. It will comprehensively analyze common security risks such as data breaches, unauthorized access and compliance issues. Discuss all security issues such as application security, data security, network security issues, authentication and authorization issues. It explains various data security techniques such as Cryptography, Steganography, Homomorphic cryptography, Quantum cryptography, DNA cryptography, Machine learning and Deep le
APA, Harvard, Vancouver, ISO, and other styles
5

Patel, Kaushikkumar. "Cloud Security." In Emerging Trends in Cloud Computing Analytics, Scalability, and Service Models. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-0900-1.ch011.

Full text
Abstract:
This chapter delves into the multifaceted aspects of cloud security, highlighting unique challenges posed by the cloud environment, such as multi-tenancy and virtualization, and the critical need for robust data privacy measures. It explores advanced security protocols and measures, emphasizing the importance of encryption and threat mitigation strategies. The discourse extends to the dynamics of mobile cloud computing security, underscoring pertinent considerations. The chapter culminates with insights into future research directions, advocating for continuous innovation in cybersecurity mech
APA, Harvard, Vancouver, ISO, and other styles
6

Kaur, Manpreet. "CLOUD COMPUTING." In Futuristic Trends in Network & Communication Technologies Volume 3 Book 2. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bgnc2p7ch3.

Full text
Abstract:
This chapter delves into the evolution, models, and components of cloud computing. It explores service models (IaaS, PaaS, SaaS, FaaS), deployment models (public, private, hybrid, community), and architectural elements like virtualization, networking, and storage. Security measures, privacy concerns, and threat mitigation strategies are discussed. The text covers cloud services such as storage, development, databases, and analytics, and examines performance optimization and scalability. Emerging trends like edge computing, serverless architecture, and multi-cloud strategies are considered, as
APA, Harvard, Vancouver, ISO, and other styles
7

Yadav, Amitabha. "Resilience Cloud Security Framework." In Data Science and Intelligent Computing Techniques. Soft Computing Research Society, 2023. http://dx.doi.org/10.56155/978-81-955020-2-8-39.

Full text
Abstract:
Cloud security refers to the practices, technologies, policies, and measures designed to protect data, applications, and infrastructure in cloud computing environments. Cloud security is crucial because organizations are cloud for their data storage which is very sensitive in nature and process critical applications in the cloud, making them potential targets for cyberattacks. Because of the ever-increasing popularity, cloud computing has garnered considerable attention during the last several decades. Businesses are getting benefited by using Cloud data storage like virtual use of Information
APA, Harvard, Vancouver, ISO, and other styles
8

Yeboah-Boateng, Ezer Osei. "Cyber-Security Concerns With Cloud Computing." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch049.

Full text
Abstract:
Information is modeled into virtual objects to create value for its owner. The value chain involves stakeholders with varied responsibilities in the cyber-market. Cloud computing emerged out of virtualization, distributed and grid computing, and has altered the value creation landscape, through strategic and sensitive information management. It offers services that use resources in a utility fashion. The flexible, cost-effective service models are opportunities for SMEs. Whilst using these tools for value-creation is imperative, a myriad of security concerns confront both providers and end-use
APA, Harvard, Vancouver, ISO, and other styles
9

Yeboah-Boateng, Ezer Osei. "Cyber-Security Concerns with Cloud Computing." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1721-4.ch005.

Full text
Abstract:
Information is modeled into virtual objects to create value for its owner. The value chain involves stakeholders with varied responsibilities in the cyber-market. Cloud computing emerged out of virtualization, distributed and grid computing, and has altered the value creation landscape, through strategic and sensitive information management. It offers services that use resources in a utility fashion. The flexible, cost-effective service models are opportunities for SMEs. Whilst using these tools for value-creation is imperative, a myriad of security concerns confront both providers and end-use
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Nimisha. "Cloud Crime and Fraud." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch055.

Full text
Abstract:
Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments t
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"

1

Kumar, Biresh, Shreya Kumari, Ritesh Kumar, Vineet Kumar Singh, Binod Kumar Sharma, and Kamaldeep Gupta. "Mitigating Security Vulnerabilities in Cloud-Based Home Automation through Advanced Edge Computing: A Comprehensive Framework for Privacy Enhancement and Data Protection." In 2025 IEEE 14th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2025. https://doi.org/10.1109/csnt64827.2025.10968051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paikrao, Rahul L., and Varsha H. Patil. "Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing." In 2018 International Conference on Advances in Communication and Computing Technology (ICACCT). IEEE, 2018. http://dx.doi.org/10.1109/icacct.2018.8529573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

R. S, Bala Kumar, and Sujitha R. "Efficient Privacy-Preserving Biometric Identification in Cloud Computing." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.

Full text
Abstract:
Benefited from its reliability and convenience, biometric identification has become one of the most popular authentication technologies. Due to the sensitivity of biometric data, various privacy-preserving biometric identification protocols have been proposed. However, the low computational efficiency or the security vulnerabilities of these protocols limit their wide deployment in practice. To further improve the efficiency and enhance the security, in this project, propose two new privacy-preserving biometric identification outsourcing protocols. One mainly utilizes the efficient Householder
APA, Harvard, Vancouver, ISO, and other styles
4

Hahn, Tobias, Thomas Kunz, Markus Schneider, and Sven Vowe. "Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kioskli, Kitty, Spyridon Papastergiou, Theofanis Fotis, Stefano Silvestri, and Haralambos Mouratidis. "A Self-Organized Swarm Intelligence Solution for Healthcare ICT Security." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004780.

Full text
Abstract:
The healthcare sector has undergone significant transformation in recent years, driven by the adoption of advanced medical technologies like IoT, Cloud Computing, and Big Data. This evolution began with the integration of electronic health records and has expanded to encompass a wide range of digital tools, from medical apps to wearables. These technological advancements have played a crucial role in enhancing patient experiences and outcomes. As healthcare technology has become increasingly interconnected, both physically and in the cyber realm, it has evolved into vast Health Care Informatio
APA, Harvard, Vancouver, ISO, and other styles
6

Saini, Vaibhav, Ayushi Jain, Pramoda Meduri, and Verolt Technology Solutions GmbH. "Revolutionizing Commercial Vehicles: Integrating Software-Defined Vehicle Architecture for Enhanced Electrical and Electronic Systems." In WCX SAE World Congress Experience. SAE International, 2025. https://doi.org/10.4271/2025-01-8138.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Commercial Vehicle (CV) market is growing rapidly with the advancement of Software-Defined Vehicles (SDVs), which provide greater level of flexibility, efficiency and integration of AI & cutting-edge technology. This research provides an in-depth analysis of E&E architecture of CVs, focusing on the integration of SDV-based technology, which represents the transition from hardware-focused to a more dynamic, software-focused methodology. The research begins with the fundamental concepts of E&E archi
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud computing · Virtualization · Security · Privacy · Vulnerabilities"

1

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!