To see the other types of publications on this topic, follow the link: Cloud security challenges.

Journal articles on the topic 'Cloud security challenges'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud security challenges.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.

Full text
Abstract:
Kubernetes enables organizations to manage applications globally, from multi-cloud to hybrid clouds. This paper presents challenges and solutions for workload orchestration, scaling, and security in such infrastructures. Running workloads across different cloud providers enables one to escape vendor lock-in and improve service availability. However, it leads to more complexity in terms of management and security. This paper will analyze the tendency of Kubernetes to orchestrate across multiple clouds in which it operates in a Multi-Cloud environment. It covers important solutions for scaling &
APA, Harvard, Vancouver, ISO, and other styles
2

Shukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.

Full text
Abstract:
As cloud computing continues to grow and become integral to business operations, securing cloud environments has emerged as a critical concern. This paper explores the multifaceted challenges of cloud security and proposes solutions to mitigate these risks. We discuss the inherent vulnerabilities of cloud infrastructure, the complexities of data protection, and the difficulties in maintaining compliance and governance. Specifically, we address issues such as data breaches, insider threats, and the lack of visibility and control in cloud environments. Through comprehensive analysis and experime
APA, Harvard, Vancouver, ISO, and other styles
4

Alrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Srikanth, Kandragula. "Security and Privacy Challenges." Journal of Scientific and Engineering Research 6, no. 10 (2019): 315–17. https://doi.org/10.5281/zenodo.14050056.

Full text
Abstract:
Cloud computing has revolutionized the way businesses operate, offering a paradigm shift from on-premise infrastructure to a virtualized, on-demand environment. However, security and privacy concerns remain a significant hurdle for some businesses considering cloud adoption. This white paper delves into the key challenges associated with cloud security and privacy, empowering businesses of all sizes to make informed decisions and navigate the potential risks involved. We begin by exploring the concept of data security threats in the cloud environment. Data breaches are a major concern, as clou
APA, Harvard, Vancouver, ISO, and other styles
6

Somanathan, Sureshkumar. "Securing the Cloud: Project Management Approaches to Cloud Security in Multi-Cloud Environments." International Journal of Applied Engineering & Technology 5, no. 2 (2023): 548–56. https://doi.org/10.5281/zenodo.14947914.

Full text
Abstract:
An initiative of this magnitude is required in order to achieve transparency and the security awareness in cloudbasedsystems. Because of the complexity of the application components, it is especially challenging in multicloudconfigurations, where the components of the application are distributed over multiple clouds. Whencompanies implement multi-cloud strategies in order to take advantage of the benefits offered by a large numberof cloud-based service providers, they are confronted with significant security challenges that are caused by thedispersed and complex structure of these systems. Mul
APA, Harvard, Vancouver, ISO, and other styles
7

Sabreena Nawaz. "Cloud Computing Services and Security Challenges: A Review." Lahore Garrison University Research Journal of Computer Science and Information Technology 7, no. 02 (2023): 17–28. http://dx.doi.org/10.54692/lgurjcsit.2023.0702459.

Full text
Abstract:
An architecture of computing that provides services over the internet on the demand and desires of users that pay for the accessible resources that are shared is refer as the cloud computing. These resources are shared over the cloud and users do not have to acquire them physically. Some of the shared resources are: software, hardware, networks, services, applications and servers. Almost every industry from hospitals to education is moving towards the cloud for storage of data because of managing the effective cost and time of organizing the resources physically on their space. Storage of data
APA, Harvard, Vancouver, ISO, and other styles
8

Emad, Al-Mousa. "The Challenges of Securing Cloud Multitenant Design." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 120–24. https://doi.org/10.5281/zenodo.8283155.

Full text
Abstract:
<strong>Abstract:</strong> Multitenant architecture is the foundational model for cloud computing model in public cloud providers, in addition to on-premise enterprise level software stack. However, this model can poses security risks to organizations, which requires good security architecture design , and understanding. &nbsp;In addition, it will require cybersecurity expertise in cloud native architecture, and the on-going challenge to ensure &quot;ISOLATION&quot; among co-hosted resources to maintain cybersecurity posture and data protection. <strong>Keywords:</strong> Cloud, Cloud Security
APA, Harvard, Vancouver, ISO, and other styles
9

Firdaus, Wigananda, and Anjik Sukmaaji. "Exploring Opportunities and Challenges in Multi-Cloud and Hybrid Cloud Implementation." Information Technology International Journal 2, no. 2 (2024): 64–69. https://doi.org/10.33005/itij.v2i2.30.

Full text
Abstract:
This study reviews the opportunities and challenges of implementing Multi-Cloud and Hybrid Cloud models that focus on security and data management. Multi-Cloud implementation offers flexibility, but also brings challenges related to security and privacy. Data security in multi-cloud can be improved by implementing encryption such as Homomorphic Encryption and Hybrid Crypto which combines DES and RSA algorithms. The Hybrid Cloud model allows integration between public and private clouds. where the implementation of Zero Trus can improve the security of the cloud network. The results of this Lit
APA, Harvard, Vancouver, ISO, and other styles
10

Nanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Patil, Asst Prof Swara Snehit. "Cloud Security: Challenges and Mechanisms." International Journal of Advance and Applied Research 6, no. 25(C) (2025): 209–11. https://doi.org/10.5281/zenodo.15331650.

Full text
Abstract:
<strong>Abstract:</strong> Cloud computing has revolutionized the way organizations store, process, and manage data. However, as the adoption of cloud technologies grows, so do concerns about the security of cloud systems. This paper explores the challenges faced by cloud security and examines the mechanisms employed to mitigate these risks. By analysing the major threats, vulnerabilities, and security mechanisms, we aim to provide a comprehensive understanding of the state of cloud security. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
12

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following propo
APA, Harvard, Vancouver, ISO, and other styles
13

Priyanka, Vashisht, Bhaskar Bajaj Shalini, Jatain Aman, and Narang Ashima. "Cloud Security: Challenges and Future Scope." International Journal of Innovative Research in Engineering and Management (IJIREM) 10, no. 03 (2023): 44–48. https://doi.org/10.5281/zenodo.8114265.

Full text
Abstract:
Now Cloud computing becomes so much popular coz satisfying business needs efficiently. Cloud features provide best lead to organizations to effectively access data and services with less cost over the internet. This also raise issues related with cloud security. This paper presents brief information regarding cloud computing security challenges. This information includes security mechanisms that should be consider for Cloud Service Models. This Work also focus on detail knowledge of security issues, threats which may use by attacker. It also explains cloud components levels threats and attack
APA, Harvard, Vancouver, ISO, and other styles
14

Researcher. "ADVANCED CLOUD INFRASTRUCTURE SECURITY: TECHNIQUES, CHALLENGES, AND IMPACT." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 892–900. https://doi.org/10.5281/zenodo.13929652.

Full text
Abstract:
This comprehensive article explores the critical role of cloud security in today's rapidly evolving digital landscape. With the global cloud computing market projected to reach $1,554.94 billion by 2030, organizations face increasing challenges in securing their cloud environments. The article delves into advanced cloud security techniques, including Identity and Access Management (IAM), encryption methods, API security, and DevSecOps practices. It examines the evolving threat landscape, focusing on Advanced Persistent Threats (APTs), insider threats, and compliance challenges. Furthermore, th
APA, Harvard, Vancouver, ISO, and other styles
15

Degtyarev, N. Yu, G. P. Zhigulin, R. A. Shakirova, and S. A. Bondarev. "ANALYSIS OF CLOUD SECURITY CHALLENGES." Scientific and Technical Volga region Bulletin 6, no. 3 (2016): 104–6. http://dx.doi.org/10.24153/2079-5920-2016-6-3-104-106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

S, Anjali M., Ananya Harshan, and Claijo Kurian V. "Security Challenges in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 1626–29. http://dx.doi.org/10.22214/ijraset.2023.49757.

Full text
Abstract:
Abstract: The most technological trend in the IT world is cloud computing, and because of its youth, both its users and its manufacturers have certain concerns. Looking over its literature, we can observe that the primary issues are trust, privacy, and security. That makes a significant barrier for users to use. Hence, to determine whether cloud computing would be accepted, we decided to assess various issues, including security. In this article, the security paradigm was the central issue, focusing on privacy safeguards and the need for trustworthiness to implement cloud computing. As a by-pr
APA, Harvard, Vancouver, ISO, and other styles
17

Totade, Mrs Sunita K. "Security Challenges in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 12, no. 10 (2024): 1360–64. http://dx.doi.org/10.22214/ijraset.2024.64816.

Full text
Abstract:
Cloud computing offers scalable resources and services over the internet, enabling businesses to reduce infrastructure costs while improving flexibility. However, its widespread adoption also brings significant security concerns, including data privacy, regulatory compliance, and threat prevention. This research paper aims to identify and analyze the primary security challenges in cloud computing, propose solutions, and discuss future research directions
APA, Harvard, Vancouver, ISO, and other styles
18

Vashisht, Priyanka, Shalini Bhaskar Bajaj, Aman Jatain, and Ashima Narang. "Cloud Security: Challenges and Future Scope." International Journal of Innovative Research in Engineering and Management 10, no. 3 (2023): 44–48. http://dx.doi.org/10.55524/ijirem.2023.10.3.8.

Full text
Abstract:
Now Cloud computing becomes so much popular coz satisfying business needs efficiently. Cloud features provide best lead to organizations to effectively access data and services with less cost over the internet. This also raise issues related with cloud security. This paper presents brief information regarding cloud computing security challenges. This information includes security mechanisms that should be consider for Cloud Service Models. This Work also focus on detail knowledge of security issues, threats which may use by attacker. It also explains cloud components levels threats and attack
APA, Harvard, Vancouver, ISO, and other styles
19

Neerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.

Full text
Abstract:
Public cloud computing has emerged as a popular and efficient solution for organizations to store, process, and access their data and applications. However, with the increasing adoption of public cloud services, concerns regarding security have become a critical factor in decision-making processes. This study aims to investigate the security aspects of public cloud computing and identify potential vulnerabilities and threats that organizations may face. The aim of this study is to examine the challenges associated with cloud computing and its security concerns. Cloud computing is a technology
APA, Harvard, Vancouver, ISO, and other styles
20

Kashif, Munir1 and Prof Dr. Sellapan Palaniappan2. "FRAMEWORK FOR SECURE CLOUD COMPUTING." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 3, April (2018): 01–15. https://doi.org/10.5281/zenodo.1434571.

Full text
Abstract:
Cloud computing has changed the entire process that distributed computing used to present e.g. Grid computing, server client computing. Cloud computing describes recent developments in many existing IT technologies and separates application and information resources from the underlying infrastructure. Cloud computing security is an important aspect of quality of service from cloud service providers. Security concerns arise as soon as one begins to run applications beyond the designated firewall and move closer towards the public domain. In violation of security in any component in the cloud ca
APA, Harvard, Vancouver, ISO, and other styles
21

Shettar, Girish, Vidyashree V. Mayacharya, and Suman Totad. "Cloud Computing Challenges." International Journal of Research in Engineering, Science and Management 7, no. 7 (2024): 55–57. https://doi.org/10.5281/zenodo.13902582.

Full text
Abstract:
Cloud computing has emerged as a transformative technology paradigm that offers unprecedented scalability, flexibility, and cost-efficiency for deploying and managing IT resources. However, the widespread adoption of cloud computing also brings forth a myriad of challenges that need to be addressed to fully realize its potential. This paper provides an overview of the key challenges facing cloud computing today, including data security and privacy concerns, network congestion and backhaul optimization, and ensuring quality of experience (QoE) for cloud services. The first challenge addressed i
APA, Harvard, Vancouver, ISO, and other styles
22

Gururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.

Full text
Abstract:
The computing capability of mobile systems is enhanced by cloud computing. Mobile devices can rely on cloud computing to perform computationally intensive operations such as data mining and searching. Mobile cloud computing refers to the availability of cloud computing services in a mobile environment. It is a combination of mobile networks and cloud computing, providing optimal services for mobile users. The use of mobile cloud computing overcomes performance-related obstacles, such as bandwidth, storage capacity, and battery life, as well as environment-related issues like availability, scal
APA, Harvard, Vancouver, ISO, and other styles
23

Al-Issa, Yazan, Mohammad Ashraf Ottom, and Ahmed Tamrawi. "eHealth Cloud Security Challenges: A Survey." Journal of Healthcare Engineering 2019 (September 3, 2019): 1–15. http://dx.doi.org/10.1155/2019/7516035.

Full text
Abstract:
Cloud computing is a promising technology that is expected to transform the healthcare industry. Cloud computing has many benefits like flexibility, cost and energy savings, resource sharing, and fast deployment. In this paper, we study the use of cloud computing in the healthcare industry and different cloud security and privacy challenges. The centralization of data on the cloud raises many security and privacy concerns for individuals and healthcare providers. This centralization of data (1) provides attackers with one-stop honey-pot to steal data and intercept data in-motion and (2) moves
APA, Harvard, Vancouver, ISO, and other styles
24

Aijaz, Usman, Mohammed Abubakar, Aditya Reddy, Abuzar ., and Alok C Pujari. "An Analysis on Security Issues and Research Challenges in Cloud Computing." Journal of Security in Computer Networks and Distributed Systems 1, no. 1 (2024): 37–44. http://dx.doi.org/10.46610/joscnds.2024.v01i01.005.

Full text
Abstract:
Cloud computing has completely transformed how businesses handle, store, and process data and applications. However, using cloud services brings several security issues that need to be resolved to guarantee the availability, confidentiality, and integrity of critical data. This abstract overviews vital aspects of cloud computing security and highlights emerging trends and research directions. Essential challenges of cloud computing security include ensuring data privacy and confidentiality, maintaining data integrity and trustworthiness, and addressing compliance with regulatory requirements.
APA, Harvard, Vancouver, ISO, and other styles
25

Shahzad, Abid, and Mureed Hussain. "Security Issues and Challenges of Mobile Cloud Computing." International Journal of Grid and Distributed Computing 6, no. 6 (2013): 37–50. http://dx.doi.org/10.14257/ijgdc.2013.6.6.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Singh Gurjit Singh, Sahibdeep. "Microservices Security Challenges and Solutions in Cloud Environment." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 201–5. http://dx.doi.org/10.21275/sr24303144734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Singh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.

Full text
Abstract:
Cloud computing has become a fundamental part of present-day IT infrastructure, presenting unprecedented tiers of scalability, flexibility, and value efficiency. However, this paradigm shift in computing comes with its very own set of protection demanding situations that demand meticulous examination. This evaluation paper delves into the multifaceted panorama of cloud computing security challenges and explores modern solutions to mitigate these concerns. The primary focus areas encompass records safety, get admission to manipulate, compliance and prison concerns, community safety, virtualizat
APA, Harvard, Vancouver, ISO, and other styles
28

Nuruddin Sheikh. "Securing the cloud: A comprehensive analysis of data security challenges and solutions." International Journal of Science and Research Archive 13, no. 1 (2024): 3471–83. https://doi.org/10.30574/ijsra.2024.13.01.1779.

Full text
Abstract:
Through cloud computing, organizations and individuals have access to more flexible, scalable and cost effective storage of data as well as a means to access and manage data. The problem is, however, the immense adoption of cloud computing has resulted in data security challenges across the globe. This work investigates different security problems that cloud infrastructures face such as data leaks, insider attacks, encryption problems and weaknesses related to common resources and multi-tenant models. However, cloud technology has significant benefits, and these risks must be safeguarded again
APA, Harvard, Vancouver, ISO, and other styles
29

Motawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.

Full text
Abstract:
Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work,
APA, Harvard, Vancouver, ISO, and other styles
30

Agarwal, Anamika, Satya Bhushan Verma, and Bineet Kumar Gupta. "A Review of Cloud Security Issues and Challenges." ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 12 (December 29, 2023): e31459. http://dx.doi.org/10.14201/adcaij.31459.

Full text
Abstract:
The advancement of information technology today depends on cloud computing. Every cloud consumer continues to search for the best services available, particularly in terms of security. The absence of uniform standards in the security architecture of the cloud, especially within the cloud computing community, has become an ongoing problem. Most cloud service providers automatically follow the best security practises and actively protect the operation of their systems. Enterprises are required to independently judge the security of their data, apps, and the cloud’s workload. The complexity of se
APA, Harvard, Vancouver, ISO, and other styles
31

Tiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.

Full text
Abstract:
Abstract: “This research paper provides a sufficient overview of security challenges in cloud computing and corresponding solutions. Challenges include data breaches, compliance issues, and insider threats, while solutions encompass robust access controls, encryption, and API security measures. By implementing these solutions, organizations can mitigate risks and securely harness the advantages of cloud computing.”
APA, Harvard, Vancouver, ISO, and other styles
32

Syed, Zaid, Kumar Mishra Pranav, TR Yogish, and B. Manjunath. "THE EVOLVING CLOUD SECURITY LANDSCAPE: CHALLENGES AND SOLUTIONS." Recent Trends in Cloud Computing and Web Engineering 7, no. 2 (2025): 1–7. https://doi.org/10.5281/zenodo.15117664.

Full text
Abstract:
<em>Cloud Computing has emerged as a pivotal technology in the IT industry over recent years. Its widespread adoption can be attributed to the significant economic benefits it offers. Numerous Cloud Service Providers (CSPs) now enable users to host their applications and data on cloud platforms. However, a major challenge persists in the form of Cloud Security, which hinders the full- scale adoption and utilization of cloud services. This issue continues to prevent many users from taking advantage of the diverse services cloud computing offers.</em> <em>To address these concerns, various mecha
APA, Harvard, Vancouver, ISO, and other styles
33

Arshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.

Full text
Abstract:
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations
APA, Harvard, Vancouver, ISO, and other styles
34

Vaikunth, Pai T., and P. S. Aithal. "Cloud Computing Security Issues - Challenges and Opportunities." International Journal of Management, Technology and Social Sciences (IJMTS) 1, no. 1 (2017): 33–42. https://doi.org/10.5281/zenodo.569920.

Full text
Abstract:
Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing non-core activities of an organization. Cloud computing offers an innovative business concept for organ
APA, Harvard, Vancouver, ISO, and other styles
35

Ballamudi, Venkata Koteswara Rao, and Harshith Desamsetti. "Security and Privacy in Cloud Computing: Challenges and Opportunities." American Journal of Trade and Policy 4, no. 3 (2017): 129–36. http://dx.doi.org/10.18034/ajtp.v4i3.667.

Full text
Abstract:
ICT advancements have made cloud computing popular and successful. Cloud computing lets corporate users relocate and utilize the pay-as-you-go price model's scalability. However, outsourcing data and business applications to the Cloud or a third party creates security and privacy concerns, which are crucial to cloud adoption. Researchers and impacted organizations have offered several security measures to address security issues in the literature. Cloud computing security and privacy are extensively covered in the literature. Unfortunately, literature efforts lack flexibility in mitigating num
APA, Harvard, Vancouver, ISO, and other styles
36

Muhammad Zulkifl Hasan, Zaka Ullah, Taimoor Hasan, and Noor ul Qamar. "Cloud Information Security Challenges and Accountable Solutions." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 1 (2018): 31–36. http://dx.doi.org/10.54692/lgurjcsit.2018.020142.

Full text
Abstract:
Cloud computing model is an advanced framework which utilizes consolidated idea of “utilitycomputing” and “software-as-a-service”, providing convenient and on-demand services torequested end users. Security in cloud figuring is a basic angle confronting a few issues that must bemulled over. Safety from any sort of external threats must be taken into care by the cloud serviceprovider and consumer so that any data theft issue is not faced by the customer afterwards. Aprobability emerges that a noxious customer can invade the cloud by having honest customers,therefore defiling the entire cloud an
APA, Harvard, Vancouver, ISO, and other styles
37

jaydip, kumar. "Cloud Computing Security Issues and Its Challenges: A Comprehensive Research." International Journal of Recent Technology and Engineering (IJRTE) 8, no. 1S4 (2019): 10–14. https://doi.org/10.5281/zenodo.4408583.

Full text
Abstract:
Cloud the&nbsp;of&nbsp;computing&nbsp;is&nbsp;used&nbsp;by&nbsp;many&nbsp;organizations for storing the huge amount of data on the clouds. Therefore, there is need to secure the data which may in the form of &nbsp;text, &nbsp;audio, &nbsp;video, &nbsp;etc. &nbsp;There &nbsp;are &nbsp;numerous &nbsp;algorithms designed by the researchers for securing the data on the cloud. The present paper by Jaydip Kumar is an attempt to elaborate some of the important algorithms for the security of data for this purpose, exhaustive literature has been conducted.
APA, Harvard, Vancouver, ISO, and other styles
38

CR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.

Full text
Abstract:
Security plays a very important role in the life of every living being. Today, in the ‘Technology’ engulfed businesses, data security is crucial for users and vendors alike. Cloud computing as a technology is the driving force behind all the financial transactions being completed every second across the globe. In the current context, Cloud data security is crucial and is of utmost importance. Data Security in the cloud refers to the technologies, policies, services, security controls that protect data in the cloud from loss, leakage or misuse through security breaches and unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
39

Elaheh, Golzardi. "Cloud Computing Security: A Survey." Journal of Information Sciences and Computing Technologies 5, no. 1 (2015): 377–85. https://doi.org/10.5281/zenodo.3968489.

Full text
Abstract:
Today, the world of Internet and Information technology, which is turned into a crucial part of human life, is growing rapidly. In this direction, the needs of societies` members including: information security, fast processing, immediate &amp; dynamic access and the most important one, cost saving have been taken into consideration. Security issues used to be the main challenge of the systems` users constantly. A crucial achievement, by which users` data are accessed broadly &amp; comprehensively, is cloud computing and storage in clouds, but this requires establishing data security in a very
APA, Harvard, Vancouver, ISO, and other styles
40

Gehaloach, Pankaj, and Rohit Mahajan. "Cloud Computing Security Issues and Challenges: A Review." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (2018): 60. http://dx.doi.org/10.23956/ijarcsse.v8i1.526.

Full text
Abstract:
With the rapid development of cloud computing, more and more data are being centralized into remote cloud server for sharing, which raises a challenge on how to keep them both private and accessible. The Research in Cloud Computing remains attractive because of crave to obtain high performance, accessibility, low cost and many other luxuries. Hence, growth of internet and virtualization technology, cloud computing gains a lot of attention in the field of computer networks. Due to these reasons to maintain secure and robust data, security in cloud computing is one of most important issue. Cloud
APA, Harvard, Vancouver, ISO, and other styles
41

Aruna, Dr L. "Cloud Computing Security Challenges and Risks." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 1635–41. http://dx.doi.org/10.22214/ijraset.2017.11234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

YASAR ARAFATH, A. "CLOUD COMPUTING SECURITY AND ITS CHALLENGES." i-manager’s Journal on Cloud Computing 7, no. 2 (2020): 20. http://dx.doi.org/10.26634/jcc.7.2.17965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kifayat, Kashif, Madjid Merabti, and Qi Shi. "Future security challenges in cloud computing." International Journal of Multimedia Intelligence and Security 1, no. 4 (2010): 428. http://dx.doi.org/10.1504/ijmis.2010.039241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ren, Kui, Cong Wang, and Qian Wang. "Security Challenges for the Public Cloud." IEEE Internet Computing 16, no. 1 (2012): 69–73. http://dx.doi.org/10.1109/mic.2012.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Yan, Gongjun, Ding Wen, Stephan Olariu, and Michele C. Weigle. "Security challenges in vehicular cloud computing." IEEE Transactions on Intelligent Transportation Systems 14, no. 1 (2013): 284–94. http://dx.doi.org/10.1109/tits.2012.2211870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Nicholson, Dave. "Cloud first – tackling the security challenges." Computer Fraud & Security 2018, no. 1 (2018): 8–11. http://dx.doi.org/10.1016/s1361-3723(18)30005-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Subramanian, Nalini, and Andrews Jeyaraj. "Recent security challenges in cloud computing." Computers & Electrical Engineering 71 (October 2018): 28–42. http://dx.doi.org/10.1016/j.compeleceng.2018.06.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Thakker, Jaydeep. "Security Challenges of Vehicular Cloud Computing." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 197–206. http://dx.doi.org/10.60087/jaigs.v2i1.106.

Full text
Abstract:
In the realm of Industry 4.0, the utilization of artificial intelligence (AI) and machine learning for anomaly detection faces challenges due to significant computational demands and associated environmental consequences. This study aims to tackle the need for high-performance machine learning models while promoting environmental sustainability, contributing to the emerging concept of 'Green AI.' We meticulously assessed a wide range of machine learning algorithms, combined with various Multilayer Perceptron (MLP) configurations. Our evaluation encompassed a comprehensive set of performance me
APA, Harvard, Vancouver, ISO, and other styles
49

Thakker, Jaydeep. "Security Challenges of Vehicular Cloud Computing." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 151–55. http://dx.doi.org/10.60087/jaigs.v2i1.p155.

Full text
Abstract:
In the realm of Industry 4.0, the utilization of artificial intelligence (AI) and machine learning for anomaly detection faces challenges due to significant computational demands and associated environmental consequences. This study aims to tackle the need for high-performance machine learning models while promoting environmental sustainability, contributing to the emerging concept of 'Green AI.' We meticulously assessed a wide range of machine learning algorithms, combined with various Multilayer Perceptron (MLP) configurations. Our evaluation encompassed a comprehensive set of performance me
APA, Harvard, Vancouver, ISO, and other styles
50

G Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.

Full text
Abstract:
As organizations increasingly adopt multi-cloud environments and containerized applications to improve scalability and operational efficiency, managing security across these diverse platforms has become a critical challenge. Traditional security tools and manual processes are insufficient to handle the complexity and dynamic nature of modern cloud infrastructures. This research introduces Cloud Guardian, a cloud security posture management (CSPM) platform that automates security assessments, policy enforcement, and threat detection across multi-cloud platforms and containerized environments. C
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!