Academic literature on the topic 'Cloud security challenges'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud security challenges.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud security challenges"
Bhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.
Full textShukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.
Full textLi, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.
Full textAlrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.
Full textSrikanth, Kandragula. "Security and Privacy Challenges." Journal of Scientific and Engineering Research 6, no. 10 (2019): 315–17. https://doi.org/10.5281/zenodo.14050056.
Full textSomanathan, Sureshkumar. "Securing the Cloud: Project Management Approaches to Cloud Security in Multi-Cloud Environments." International Journal of Applied Engineering & Technology 5, no. 2 (2023): 548–56. https://doi.org/10.5281/zenodo.14947914.
Full textSabreena Nawaz. "Cloud Computing Services and Security Challenges: A Review." Lahore Garrison University Research Journal of Computer Science and Information Technology 7, no. 02 (2023): 17–28. http://dx.doi.org/10.54692/lgurjcsit.2023.0702459.
Full textEmad, Al-Mousa. "The Challenges of Securing Cloud Multitenant Design." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 120–24. https://doi.org/10.5281/zenodo.8283155.
Full textFirdaus, Wigananda, and Anjik Sukmaaji. "Exploring Opportunities and Challenges in Multi-Cloud and Hybrid Cloud Implementation." Information Technology International Journal 2, no. 2 (2024): 64–69. https://doi.org/10.33005/itij.v2i2.30.
Full textNanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.
Full textDissertations / Theses on the topic "Cloud security challenges"
Bulusu, Santosh, and Kalyan Sudia. "A Study on Cloud Computing Security Challenges." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2820.
Full textInam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.
Full textMaddineni, Venkata Sravan Kumar, and Shivashanker Ragi. "Security Techniques for protecting data in Cloud Computing." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3430.
Full textTran, Minh-Dung. "Privacy Challenges in Online Targeted Advertising." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM053/document.
Full textGroßkopf, Heiko. "Challenges of Service Interchange in a cross cloud SOA Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-42979.
Full textKhan, Hiba. "What Are the Security Challenges Concerning Maintenance Data in the Railway Industry." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75741.
Full textKalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Full textAlkhwaldi, A. F. A., Mumtaz A. Kamala, and Rami S. R. Qahwaji. "Analysis of cloud-based e-government services acceptance in Jordan: challenges and barriers." 2018. http://hdl.handle.net/10454/16589.
Full textBooks on the topic "Cloud security challenges"
Kumar, T. Ananth, T. S. Arun Samuel, R. Dinesh Jackson Samuel, and M. Niranjanamurthy. Privacy and Security Challenges in Cloud Computing. CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880.
Full textHari, Kokula Krishna, ed. Security Issues and Challenges in Cloud Computing: ICIEMS 2014. Association of Scientists, Developers and Faculties, 2014.
Find full textCloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.
Find full textVacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.
Find full textVacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.
Find full textVacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.
Find full textVacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.
Find full textVacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.
Find full textVacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.
Find full textVacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.
Find full textBook chapters on the topic "Cloud security challenges"
Martin, John Paul, Vipin Singh, K. Chandrasekaran, and A. Kandasamy. "Explicating Fog Computing Key Research Challenges and Solutions." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-4.
Full textJahankhani, Hamid, and Amin Hosseinian-Far. "Challenges of Cloud Forensics." In Enterprise Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54380-2_1.
Full textOppitz, Marcus, and Peter Tomsu. "Security and Privacy Challenges." In Inventing the Cloud Century. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61161-7_14.
Full textDave, Dhaivat, Nayana Meruliya, Tirth D. Gajjar, Grishma T. Ghoda, Disha H. Parekh, and R. Sridaran. "Cloud Security Issues and Challenges." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6620-7_48.
Full textSchoo, Peter, Volker Fusenig, Victor Souza, et al. "Challenges for Cloud Networking Security." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21444-8_26.
Full textKebande, Victor R., Richard A. Ikuesan, and Nickson M. Karie. "Review of Blockchain Forensics Challenges." In Blockchain Security in Cloud Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70501-5_3.
Full textYu, Shuyan. "Towards the Cloud Computing from Services to Securities and Challenges." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7_31.
Full textChang, Hyokyung, and Euiin Choi. "Challenges and Security in Cloud Computing." In Communication and Networking. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17604-3_24.
Full textSaini, Taksheel, and Sapna Sinha. "Cloud Computing Security Issues and Challenges." In Integration of Cloud Computing with Emerging Technologies. CRC Press, 2023. http://dx.doi.org/10.1201/9781003341437-4.
Full textKanwal, Iqra, Hina Shafi, Shahzad Memon, and Mahmood Hussain Shah. "Cloud Computing Security Challenges: A Review." In Cybersecurity, Privacy and Freedom Protection in the Connected World. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68534-8_29.
Full textConference papers on the topic "Cloud security challenges"
Asassfeh, Mahmoud Rajallah, Esraa Abu Elsoud, Sultan Mohammed Albilasi, et al. "Cloud Security: Analyzing Threats and Challenges." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877035.
Full textZakiyyah, Rika, Daniel Permana, Devan Valenecio, Andry Chowanda, Yohan Muliono, and Zahra Nabila Izdihar. "Security Challenges and Issues in Cloud Computing." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758966.
Full textKiran, Masina Sai, Balajee R M, Koripella Veera Venkata Satya Sai, M. V. V. Satya Kishore, and Srithar S. "Cloud Transformation and the Key Concerns for Cloud Security and Challenges." In 2024 Second International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2024. http://dx.doi.org/10.1109/icici62254.2024.00076.
Full textKumar, Anshul, Gagan Tiwari, and Aadarsh Malviya. "Emerging Security Challenges in Advanced Cloud Computing Environment." In 2024 2nd International Conference on Advancements and Key Challenges in Green Energy and Computing (AKGEC). IEEE, 2024. https://doi.org/10.1109/akgec62572.2024.10869168.
Full textCharu, Sandeep Mathur, and Alok Singh Sengar. "Evaluating Current Cloud Security Challenges and IAAS Optimization." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10828722.
Full textHarshavardhan, H., Sanjana Madi, Shivaleela Kalasad, Sameeksha Shetty, and Vaibhavi Malemath. "Ensuring Data Security in the Cloud: Emerging Security Challenges and Solutions." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI). IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894030.
Full textNaik, Arjun Sudhanva. "Securing Banking Applications in the Cloud: Challenges and Strategies for Enhanced Security." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10826766.
Full textSharma, Suprina, Shuchi Sharma, and Ankita Sharma. "Security Algorithms in Cloud Computing: Challenges and Key Discussions." In 2024 2nd International Conference on Advancements and Key Challenges in Green Energy and Computing (AKGEC). IEEE, 2024. https://doi.org/10.1109/akgec62572.2024.10868757.
Full textRawal, Bharat S. "A Quantum Safe Approach for Security Challenges at the Edge of Cloud in 5G and Beyond." In 2024 IEEE Cloud Summit. IEEE, 2024. http://dx.doi.org/10.1109/cloud-summit61220.2024.00038.
Full textKulkarni, Gurudatt, Nikita Chavan, Ruchira Chandorkar, Rani Waghmare, and Rajnikant Palwe. "Cloud security challenges." In 2012 7th Telecommunications, Systems, Services, and Applications (TSSA). IEEE, 2012. http://dx.doi.org/10.1109/tssa.2012.6366028.
Full textReports on the topic "Cloud security challenges"
Hendrick, Stephen, Adrienn Lawson, and Jeffrey Sica. 2024 Cloud Native Security Report: How Organizations Are Addressing Security for Cloud Native Application Development. The Linux Foundation, 2024. https://doi.org/10.70828/mrce5096.
Full textAkyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1052949.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textSinha, Amisha. Challenges And Best Practices for Integrating Security Orchestration, Automation, And Response (SOAR) Platforms With Cloud Infrastructure. Iowa State University, 2024. https://doi.org/10.31274/cc-20250502-2.
Full textHendrick, Stephen, and Ranny Haiby. The 2025 Open Source Networking Study: The Role and Value of Open Source in the Networking Industry’s Software Stack. The Linux Foundation, 2025. https://doi.org/10.70828/vihf5211.
Full textRazdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, 2021. http://dx.doi.org/10.4271/epr2021009.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textKhan, Samir. Redefining Space Commerce: The Move Toward Servitization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024002.
Full textSus, Monika, Cornelius Adebah, and Angel Saz-Carranza. 10 Recommendations to Make the European Union a Stronger Global Actor. EsadeGeo. Center for Global Economy and Geopolitics, 2024. https://doi.org/10.56269/202406/ms.
Full textRiter, Karmann, Anthony Clint Clayton, Kelley Rountree, and Prakash Doraiswamy. Solar Station for an Off-the-Grid Air Quality Sensor System. RTI Press, 2023. http://dx.doi.org/10.3768/rtipress.2023.mr.0051.2306.
Full text