Journal articles on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Uddin, Mueen, Anjum Khalique, Awais Khan Jumani, Syed Sajid Ullah, and Saddam Hussain. "Next-Generation Blockchain-Enabled Virtualized Cloud Security Solutions: Review and Open Challenges." Electronics 10, no. 20 (2021): 2493. http://dx.doi.org/10.3390/electronics10202493.

Full text
Abstract:
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for
APA, Harvard, Vancouver, ISO, and other styles
2

Renjith, E. Jeslin. "Revolutionizing Cloud Security: Innovative Approaches for Safeguarding Data Integrity." FMDB Transactions on Sustainable Computer Letters 2, no. 2 (2024): 111–19. http://dx.doi.org/10.69888/ftscl.2024.000185.

Full text
Abstract:
Cloud computing uses third-party servers or private clouds to provide online services and on-demand enterprise resource access. Microsoft Azure, Amazon, IBM, and Google Apps allow customers to design and run cloud-based apps from anywhere. These cloud services store and retrieve data from faraway servers, highlighting the importance of security due to internet data transfer. Before using cloud computing, firms must handle security issues. Pay-per-use, self-service, and scalability make the model popular in banking, healthcare, retail, education, manufacturing, and business. Pay-per-use models
APA, Harvard, Vancouver, ISO, and other styles
3

Pragya, Rathore, and Mishra Sachin. "5G Security Challenges & Solutions: A Comprehensive Survey." International Journal for Research Trends and Innovation 9, no. 5 (2024): 517–32. https://doi.org/10.5281/zenodo.11568989.

Full text
Abstract:
5G technology offers faster connections than ever before, but it also poses a variety of new security vulnerabilities. 5G is expected to enhance user mobility, and facilitate ultra-reliable and cost-effective networking of a vast array of devices, including the Internet of Things (IoT).  The primary technology accelerators, including Network Function Virtualization (NFV), Software Defined Networking (SDN), and cloud computing, are developing in preparation for their application in 5G.  This paper describes the primary 5G security issues and provides workarounds for these problems. Th
APA, Harvard, Vancouver, ISO, and other styles
4

Adi, Maheswara Reddy G. 1. Dr K. Venkata Rao2 Dr JVR Murthy3. "AN EFFECTIVE AND SECURED TECHNIQUE FOR SIDE-CHANNEL ATTACKS IN CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 11 (2017): 226–33. https://doi.org/10.5281/zenodo.1049426.

Full text
Abstract:
Nowadays in cloud based business services have risks of side channel attacks. Cache-based side channel attack, cross-VM side channel attacks are the serious threat and security pitfall under same cloud network services. In order to provide more security and less infrastructure investment leads to challenging task. In this paper, the discussions on various levels of attacks on VM ware based solution under same cloud network computing, vulnerabilities to other cloud services, security weakness and counter measures in cryptographic algorithms.
APA, Harvard, Vancouver, ISO, and other styles
5

Misono, Masanori, Dimitrios Stavrakakis, Nuno Santos, and Pramod Bhatotia. "Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–42. https://doi.org/10.1145/3700418.

Full text
Abstract:
Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the programmability and usability challenges of the previously proposed enclave-based trusted computing technologies. CVM hardware extensions facilitate secure, hardware-isolated encrypted VMs, promoting programmability and easier deployment in cloud infrastructures. However, differing microarchitectural features, interfaces, and security properties among hardwa
APA, Harvard, Vancouver, ISO, and other styles
6

Bobda, Christophe, Joel Mandebi Mbongue, Paul Chow, et al. "The Future of FPGA Acceleration in Datacenters and the Cloud." ACM Transactions on Reconfigurable Technology and Systems 15, no. 3 (2022): 1–42. http://dx.doi.org/10.1145/3506713.

Full text
Abstract:
In this article, we survey existing academic and commercial efforts to provide Field-Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a critical review of existing systems and a discussion of their evolution from single workstations with PCI-attached FPGAs in the early days of reconfigurable computing to the integration of FPGA farms in large-scale computing infrastructures. From the lessons learned, we discuss the future of FPGAs in datacenters and the cloud and assess the challenges likely to be encountered along the way. The article explores current arch
APA, Harvard, Vancouver, ISO, and other styles
7

N, Saravanan, and Umamakeswari A. "Security Vulnerabilities of Virtualization Technique." International Journal of Engineering & Technology 7, no. 2.24 (2018): 478. http://dx.doi.org/10.14419/ijet.v7i2.24.12140.

Full text
Abstract:
Cloud computing is a computing model for delivering resources in a convenient manner from a shared pool. The resources provisioned and released on an on-demand basis with minimal intervention of service provider. Cloud Computing is becoming the platform for all kind of web based services. Virtualization is the key concept to adopt the cloud computing. Virtualization offers many benefits comparing to real physical machine implementation infrastructure. Even though virtualization provides lots of benefits, it is also brings several security vulnerabilities. This paper presents the security breac
APA, Harvard, Vancouver, ISO, and other styles
8

Sabir Abbas and Shan-e-Zahra. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 2 (2018): 32–37. http://dx.doi.org/10.54692/lgurjcsit.2018.020234.

Full text
Abstract:
The cloud computing virtualization stage, services as another method for giving computing resources, gives clients available and financially savvy benefits, and brings hazards in the meantime. In this way, ensuring the privacy, trustworthiness, and accessibility of client information turns out to be significantly more basic to distributed computing frameworks. Huawei gives the virtualization stage security answers to confront the dangers and difficulties postured to the distributed computing framework. This article portrays the techniques and measures received by Huawei cloud computing virtual
APA, Harvard, Vancouver, ISO, and other styles
9

Sabir Abbas, Shan-E- Zahra, and Noor Ul Qamar. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 1, no. 4 (2017): 58–63. https://doi.org/10.54692/lgurjcsit.2017.010415.

Full text
Abstract:
The cloud computing virtualization stage is another method for giving computing resources that give clients available and financially savvy benefits, and bring hazards in meantime. In this way, ensuring the privacy, trustworthiness and accessibility of client information turns out to be significantly more basic to distributed computing frameworks. Huawei gives the virtualization stage security answers for confronting the dangers and difficulties postured to the distributed computing framework. This article portrays the techniques and measures received by Huawei cloud computing virtualization s
APA, Harvard, Vancouver, ISO, and other styles
10

Saugatdeep, Ranabhat, Alexey N. Nazarov, and Tuleun Terhemen Daniel. "VIRTUALIZATION SECURITY: A GATEWAY TO SECURE CLOUD COMPUTING." SYNCHROINFO JOURNAL 8, no. 6 (2022): 2–9. http://dx.doi.org/10.36724/2664-066x-2022-8-6-2-9.

Full text
Abstract:
Lately, the most efficient solution for an organization and individual of internet based distributed computing platforms is cloud computing. Processing, storage, and data management are just a few of the useful services that end users can get from cloud computing. However, it raises a lot of issues with privacy and security which needs to be resolved. Major component of cloud computing is virtualization technology, which helps to develop complex cloud services based on the externalization and composition of these resources. The primary concern with cloud computing security is virtualization se
APA, Harvard, Vancouver, ISO, and other styles
11

Zhou, Guo Hong. "Study of Cloud Computing and Advanced Manufacturing Technology under Information Technology Development." Applied Mechanics and Materials 484-485 (January 2014): 227–30. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.227.

Full text
Abstract:
Cloud computing can be regarded as the integration of grid computing and virtualization technology: namely the use of grid distributed computing processing power of IT resources and build into a resource pool, plus on a mature server virtualization, storage virtualization technology make users can real-time monitoring and deployment of resources. Cloud computing and advanced manufacturing technology is facing many challenges during the process of development in the future, including security and privacy will become a primary issue. This study focused on relations with the important areas of em
APA, Harvard, Vancouver, ISO, and other styles
12

Avneet, kaur, Gaurav Gupta Dr., and Gurjit Singh Bhathal Dr. "ROLE OF VIRTUALIZATION IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 4, no. 7 (2017): 143–50. https://doi.org/10.5281/zenodo.835421.

Full text
Abstract:
Cloud Computing is the fundamental change happening in the field of Information Technology.. Virtualization is the key component of cloud computing. With the use of virtualization, cloud computing brings about not only convenience and efficiency benefits, but also great challenges in the field of data security and privacy protection. .In this paper, we are discussing about virtualization, architecture of virtualization technology as well as Virtual Machine Monitor (VMM). Further discussing about technique of virtualization, reasons to use virtualization, Pros and Cons of Traditional Server Con
APA, Harvard, Vancouver, ISO, and other styles
13

Annane, Boubakeur, and Osman Ghazali. "Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 20. http://dx.doi.org/10.3991/ijim.v13i04.10515.

Full text
Abstract:
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones, tablet, and other personal digital assistant (PDA) which provides a robust technology called Mobile Cloud Computing (MCC). Although MCC have brought many advantages for the mobile users, it also stills suffer from security and privacy side of data
APA, Harvard, Vancouver, ISO, and other styles
14

Kumar, K. Dinesh, and E. Umamaheswari. "AN AUTHENTICATED, SECURE VIRTUALIZATION MANAGEMENT SYSTEM IN CLOUD COMPUTING." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 45. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19544.

Full text
Abstract:
Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud
APA, Harvard, Vancouver, ISO, and other styles
15

Kumar, Sarvesh, Himanshu Gautam, Shivendra Singh, and Mohammad Shafeeq. "Top Vulnerabilities in Cloud Computing." ECS Transactions 107, no. 1 (2022): 16887–99. http://dx.doi.org/10.1149/10701.16887ecst.

Full text
Abstract:
Cloud computing is rising quickly and without uncertainty it is the new generation of technology where people will utilize whenever and wherever. In this web-based world, cloud computing is rising higher by giving everything to the necessary assets, applications, programming, equipment, registering capacity to figuring foundations, business procedure to control joint effort. Today clouds with virtualization are changing IT. Separated by their prominences it has a few concerns which are turning out to be complications for its more extensive selection. Being a relatively newer technology, cloud
APA, Harvard, Vancouver, ISO, and other styles
16

Zoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss
APA, Harvard, Vancouver, ISO, and other styles
17

Dina, Mohsen Zoughbi, and Dutta Nitul. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 2 (2020): 42–48. https://doi.org/10.5281/zenodo.5835945.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss
APA, Harvard, Vancouver, ISO, and other styles
18

Sowmya, Pappu, and R. Kumar. "AN EFFICIENT APPROACH TO IMPLEMENT FEDERATED CLOUDS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 40. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19543.

Full text
Abstract:
Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cl
APA, Harvard, Vancouver, ISO, and other styles
19

Chandana Kumari, P. ILA, S. Swarajya Laxmi, B. Rekha, et al. "VMM based Secured Virtualization in Cloud-Computing." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 643. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp643-648.

Full text
Abstract:
Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for
APA, Harvard, Vancouver, ISO, and other styles
20

Journal, IJSREM. "Cloud Computing Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem38330.

Full text
Abstract:
Cloud computing has transformed the IT landscape by providing scalable resources and services over the internet. However, this paradigm shift raises important security issues that need to be addressed to ensure data integrity, privacy and availability. This summary provides an overview of the primary security challenges in cloud computing, including data breaches, unauthorized access rights, and shared infrastructure vulnerabilities. It examines the various strategies and technologies used to mitigate these risks, such as encryption, multi-factor authentication and robust monitoring systems. I
APA, Harvard, Vancouver, ISO, and other styles
21

Zheng, Luxin, Jian Zhang, Faxin Lin, and Xiangyi Wang. "Feature-Fusion-Based Abnormal-Behavior-Detection Method in Virtualization Environment." Electronics 12, no. 16 (2023): 3386. http://dx.doi.org/10.3390/electronics12163386.

Full text
Abstract:
From general systems to mission-critical systems at financial and government institutions, the application scope of cloud computing services is continuously expanding. Therefore, there is a need for better methods to ensure the stability and security of the cloud data and services. Monitoring the abnormal behavior of virtual machines (VMs) is one of the most-important means to identify the causes of security incidents related to the cloud. However, current traditional abnormal-behavior-detection methods for VMs on cloud platforms face multiple challenges such as privacy protection and the sema
APA, Harvard, Vancouver, ISO, and other styles
22

Adil Dheyab, Omar, Ahmed Ibrahim Turki, and B. Rahmatullah B. Rahmatullah. "Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq." Journal of Social Sciences Research, SPI6 (December 25, 2018): 599–606. http://dx.doi.org/10.32861/jssr.spi6.599.606.

Full text
Abstract:
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere. In addition, many other features and services can be offered to customers. However, cloud computing still suffers many threats which may cause vulnerabilities. Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality. Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud co
APA, Harvard, Vancouver, ISO, and other styles
23

Narayana, K. E., and K. Jayashree. "Security Analysis of Storage, Virtualization, Infrastructure and Standardization in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (2020): 3754–58. http://dx.doi.org/10.1166/jctn.2020.9315.

Full text
Abstract:
Nowadays the cloud computing grows in high rate with the help of recent technological advancement. It provides the on demand and low cost services to the customer. Cloud computing distributes the services to various location based on the demand. The services can cross various layers and location which leads the security problem. The existing security system provides reliable solutions which are not enough to secure the resource and services from unauthorized access. Three types of security is available in the cloud namely Infrastructure security, Platform security and application security. The
APA, Harvard, Vancouver, ISO, and other styles
24

Zhu, Hui, Yingfang Xue, Xiaofeng Chen, Qiang Li, and Hui Li. "V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/841292.

Full text
Abstract:
With the pervasiveness of smart phones and the advance of Mobile Internet, more and more Mobile Internet services migrated to the cloud service platform for better user experience. As one of the most indispensable components of the cloud computing infrastructure, virtualization technology has attracted considerable interest recently. However, the flourish of virtualization still faces many challenges in information security. In this paper, we propose a novel architecture, called multilevel and grouping security model for virtualization (V-MGSM), for the security of resources in cloud computing
APA, Harvard, Vancouver, ISO, and other styles
25

Raja, Vinayak. "Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, no. 1 (2024): 121–41. http://dx.doi.org/10.60087/jaigs.vol4.issue1.p141.

Full text
Abstract:
As organizations transition towards cloud computing environments, the significance of security and privacy concerns escalates. This research report conducts a systematic exploration of diverse challenges and vulnerabilities inherent in cloud computing, with a particular emphasis on security and privacy issues. The study extensively evaluates potential threats ranging from data breaches to unauthorized access, and it evaluates the repercussions of these challenges on user trust and data integrity within cloud infrastructure. Moreover, it proposes and discusses effective strategies and solutions
APA, Harvard, Vancouver, ISO, and other styles
26

Raja, Vinayak. "Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, no. 1 (2024): 121–44. http://dx.doi.org/10.60087/jaigs.v4i1.86.

Full text
Abstract:
As organizations transition towards cloud computing environments, the significance of security and privacy concerns escalates. This research report conducts a systematic exploration of diverse challenges and vulnerabilities inherent in cloud computing, with a particular emphasis on security and privacy issues. The study extensively evaluates potential threats ranging from data breaches to unauthorized access, and it evaluates the repercussions of these challenges on user trust and data integrity within cloud infrastructure. Moreover, it proposes and discusses effective strategies and solutions
APA, Harvard, Vancouver, ISO, and other styles
27

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8500.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following propo
APA, Harvard, Vancouver, ISO, and other styles
28

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following propo
APA, Harvard, Vancouver, ISO, and other styles
29

Kazi, Abdullah A. "Enhancing Security in Cloud Computing: Challenges, Techniques and Future Trends." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50628.

Full text
Abstract:
Abstract - Cloud computing has revolutionized the way organizations store, manage, and process data by offering scalable and on-demand resources. However, this shift to the cloud introduces significant security challenges that demand rigorous attention. Issues such as data breaches, insecure interfaces, insider threats, and regulatory compliance remain major concerns for both cloud service providers and consumers. This paper investigates the key security challenges in cloud computing environments and evaluates the current techniques employed to mitigate these risks. Additionally, it explores e
APA, Harvard, Vancouver, ISO, and other styles
30

Motawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.

Full text
Abstract:
Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work,
APA, Harvard, Vancouver, ISO, and other styles
31

Ahmed Ibrahim Turki and Qasim Mohammed Hussein. "Solutions of diagnosis of security issues and attacks for storage in cloud computing." Tikrit Journal of Pure Science 23, no. 4 (2018): 118–23. http://dx.doi.org/10.25130/tjps.v23i4.532.

Full text
Abstract:
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use of cloud computing is an additional source of security risk due to third-party outsourcing, as makes maintaining the privacy, availability and security of data is very difficult. Cloud computing has many of its supporting technologies (virtualization, Web 2.0, service-oriented architecture), which inherits many security issues and makes them susceptible to at
APA, Harvard, Vancouver, ISO, and other styles
32

Annane, Boubakeur, Adel Alti, and Osman Ghazali. "Research gaps based virtualization in mobile cloud computing." International Journal of Advanced Computer Research 10, no. 51 (2020): 212–22. http://dx.doi.org/10.19101/ijacr.2020.1048101.

Full text
Abstract:
Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and proce
APA, Harvard, Vancouver, ISO, and other styles
33

Alharbe, Nawaf, Abeer Aljohani, and Mohamed Ali Rakrouki. "A Novel Data Partitioning Method for Active Privacy Protection Applied to Medical Records." Electronics 12, no. 6 (2023): 1489. http://dx.doi.org/10.3390/electronics12061489.

Full text
Abstract:
In recent years, cloud computing has attracted extensive attention from industry and academia due to its convenience and ubiquity. As a new Internet-based IT service model, cloud computing has brought revolutionary changes to traditional computing and storage services. More and more individual users and enterprises are willing to deploy their own data and applications on the cloud platform, but the accompanying security issues have also become an obstacle to the development of cloud computing. Multi-tenancy and virtualization technologies are the main reasons why cloud computing faces many sec
APA, Harvard, Vancouver, ISO, and other styles
34

Khan, Nayeem, and Tariq Ahmad. "A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing." International Journal of Computer Applications 173, no. 1 (2017): 15–19. http://dx.doi.org/10.5120/ijca2017915204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Singh, Dr Satinderjeet. "A Comprehensive Review on Data Security and Threats for Data Management in Cloud Computing." Middle East Journal of Applied Science & Technology 05, no. 02 (2022): 201–9. http://dx.doi.org/10.46431/mejast.2022.5220.

Full text
Abstract:
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exi
APA, Harvard, Vancouver, ISO, and other styles
36

Dr., Satinderjeet Singh. "A Comprehensive Review on Data Security and Threats for Data Management in Cloud Computing." Middle East Journal of Applied Science & Technology 5, no. 2 (2022): 201–9. https://doi.org/10.46431/MEJAST.2022.5220.

Full text
Abstract:
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exi
APA, Harvard, Vancouver, ISO, and other styles
37

Researcher. "IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 351–65. https://doi.org/10.5281/zenodo.13828259.

Full text
Abstract:
Cloud computing is a prominent developing technology that primarily focuses on data storage and the provision of on-demand computer resources for diverse applications. Users may save their data on the cloud and access it quickly and effortlessly. The accessibility of cloud data from any location at any time has drawn many users to this technology; yet, a significant concern in this setting is the privacy of user data. The consolidation of many users' data in a single location raises concerns over data privacy among the users. Virtualization is a method used to provide a virtual environment for
APA, Harvard, Vancouver, ISO, and other styles
38

Ali, Gholami, and Laure Erwin. "BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD." International Journal of Network Security & Its Applications (IJNSA) 8, no. 1 (2016): 59 to 79. https://doi.org/10.5281/zenodo.3345302.

Full text
Abstract:
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. This paper reviews the existing technologies and a wide array of both earlier and state-ofthe-art projects on cloud security and privacy. We categorize the existing researc
APA, Harvard, Vancouver, ISO, and other styles
39

Ouda, Alia J., Ali N. Yousif, Ayat S. Hasan, Hassan M. Ibrahim, and Methaq A. Shyaa. "The Impact of Cloud Computing on Network Security and the Risk for Organization Behaviors." Webology 19, no. 1 (2022): 195–206. http://dx.doi.org/10.14704/web/v19i1/web19015.

Full text
Abstract:
Cloud computing is currently provided consumer or business IT support via social media or by using the internet. Cloud computing on the other hand, is increasing the level of the network security risk due to the services are basically presented by a third party. This results in hard to control the privacy and data security. In addition, to maintain the service availability and support data collections. Cloud computing clouts several technologies such as virtualization, SOA, and Web 2.0, it is also claimed their security risk matters. In this paper, the most serious and important risks and thre
APA, Harvard, Vancouver, ISO, and other styles
40

Dr. Ashutosh Sharma. "The Role of Cloud Computing in Shaping Network Security: Implications for Organizational Behavior." Innovative Research Thoughts 10, no. 3 (2024): 183–205. http://dx.doi.org/10.36676/irt.v10.i3.1501.

Full text
Abstract:
Cloud computing is currently provided consumer or business IT support via social media or by using the internet. Cloud computing on the other hand, is increasing the level of the network security risk due to the services are basically presented by a third party. This results in hard to control the privacy and data security. In addition, to maintain the service availability and support data collections. Cloud computing clouts several technologies such as virtualization, SOA, and Web 2.0, it is also claimed their security risk matters. In this paper, the most serious and important risks and thre
APA, Harvard, Vancouver, ISO, and other styles
41

Khan, Nabeel, and Adil Al-Yasiri. "Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework." International Journal of Information Technology and Web Engineering 11, no. 3 (2016): 50–64. http://dx.doi.org/10.4018/ijitwe.2016070104.

Full text
Abstract:
Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with clo
APA, Harvard, Vancouver, ISO, and other styles
42

Neerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.

Full text
Abstract:
Public cloud computing has emerged as a popular and efficient solution for organizations to store, process, and access their data and applications. However, with the increasing adoption of public cloud services, concerns regarding security have become a critical factor in decision-making processes. This study aims to investigate the security aspects of public cloud computing and identify potential vulnerabilities and threats that organizations may face. The aim of this study is to examine the challenges associated with cloud computing and its security concerns. Cloud computing is a technology
APA, Harvard, Vancouver, ISO, and other styles
43

Tang, Kai. "Research on Security Strategies of Digital Library Based on Cloud Computing Platform." Advanced Materials Research 734-737 (August 2013): 3171–74. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3171.

Full text
Abstract:
Based on the application of cloud computing, digital library is a cloud with a powerful computing capability, which is integrated from many relatively low cost computing entities through network. This cloud can be applied to store all types of document resources and conduct computing application, so as to unify the management by the means of resources sharing. The users can use a variety of terminal equipment to access it without any limitation of time and place, and it can carry on the service charge process based on the use of resources. The framework of digital library based on cloud platfo
APA, Harvard, Vancouver, ISO, and other styles
44

Janak Bharat Bhalla. "Safeguarding sensitive data with confidential computing." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 421–27. https://doi.org/10.30574/wjaets.2025.15.2.0505.

Full text
Abstract:
Confidential computing emerges as a transformative solution in modern data protection, addressing critical vulnerabilities in cloud environments and digital infrastructure. By implementing hardware-based security mechanisms through Trusted Execution Environments (TEEs), organizations can now protect sensitive information throughout their entire computational lifecycle. The technology revolutionizes secure data processing across healthcare, financial services, government, and IoT sectors, enabling unprecedented levels of privacy and security. With innovations in homomorphic encryption, confiden
APA, Harvard, Vancouver, ISO, and other styles
45

Asvija B., Eswari R., and Bijoy M. B. "Security Threat Modelling With Bayesian Networks and Sensitivity Analysis for IAAS Virtualization Stack." Journal of Organizational and End User Computing 33, no. 4 (2021): 44–69. http://dx.doi.org/10.4018/joeuc.20210701.oa3.

Full text
Abstract:
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security. In this article, the authors employ the concept of Bayesian networks and attack graphs to carry out sensitivity analysis on the different components involved in virtualization security for infrastructure as a service (IaaS) cloud infrastructures. They evaluate the Bayesian attack graph (BAG) for the IaaS model to reveal the sensitive regions and thus help the administr
APA, Harvard, Vancouver, ISO, and other styles
46

Ke, Changbo, Zhiqiu Huang, Weiwei Li, Yi Sun, and Fangxiong Xiao. "Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing." Journal of Applied Mathematics 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/240425.

Full text
Abstract:
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. Therefore how to protect user privacy information has become a research focus. In this paper, firstly, we model service privacy policy and user privacy preference with description logic. Secondly, we use the pellet reasonor to verify the consistency and satisfiability, so as to detect the privacy conflict between services and user. Thirdly, we present the algorithm of detecting privacy c
APA, Harvard, Vancouver, ISO, and other styles
47

Ahirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (2021): 30–35. http://dx.doi.org/10.51767/jc1204.

Full text
Abstract:
This paper is about the An Analytical Study on Cloud Computing. Cloud computing is the development of parallel computing, grid computing, distributed computing, and virtualization technologies which define the shape of a new area. In contrast to a variety of benefits related with cloud computing, there are certain challenges as well. These challenges include security, privacy and reliability of data, high costs of data transfers, and regularity in the availability of services, and bugs in large-scale distributed systems. Cloud computing is a method of computing in a place that provides users w
APA, Harvard, Vancouver, ISO, and other styles
48

Singh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.

Full text
Abstract:
Cloud computing has become a fundamental part of present-day IT infrastructure, presenting unprecedented tiers of scalability, flexibility, and value efficiency. However, this paradigm shift in computing comes with its very own set of protection demanding situations that demand meticulous examination. This evaluation paper delves into the multifaceted panorama of cloud computing security challenges and explores modern solutions to mitigate these concerns. The primary focus areas encompass records safety, get admission to manipulate, compliance and prison concerns, community safety, virtualizat
APA, Harvard, Vancouver, ISO, and other styles
49

Sahmim Ep Guerbouj, Syrine, Hamza Gharsellaoui, and Sadok Bouamama. "A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things." International Journal of Service Science, Management, Engineering, and Technology 10, no. 3 (2019): 32–44. http://dx.doi.org/10.4018/ijssmet.2019070103.

Full text
Abstract:
This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing secur
APA, Harvard, Vancouver, ISO, and other styles
50

Leyla Kerimli, Leyla Kerimli. "SECURITY ISSUES IN MOBILE CLOUD COMPUTING TECHNOLOGY." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 47, no. 12 (2024): 406–13. https://doi.org/10.36962/pahtei47122024-43.

Full text
Abstract:
The widespread use of smartphones and other mobile devices has brought significant changes to the storage requirements of cloud systems, necessitating a reevaluation of security protocols. Mobile Cloud Computing (MCC) is a computing paradigm that combines the capabilities of mobile devices with the flexibility and scalability of cloud computing. MCC allows mobile users to access computational power, storage, and applications over the internet, facilitating resource-intensive tasks such as data analysis, gaming, and multimedia streaming on resource-constrained mobile devices. The integration of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!